2010 10th IEEE International Conference on Computer and Information Technology 2010
DOI: 10.1109/cit.2010.203
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
3

Year Published

2010
2010
2014
2014

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 12 publications
0
3
0
3
Order By: Relevance
“…Referring to the example scenario, policy authors at Acme and Widget, from the perspective of a resource consumer and provider, respectively, utilize a common terminology and syntax to express their preferences regarding the same resource (i.e., engine parts availability information). The basic concepts discussed in this section are derive from the authors’ previous work on personal data protection in passive network monitoring .…”
Section: Semantic Information Modelmentioning
confidence: 99%
“…Referring to the example scenario, policy authors at Acme and Widget, from the perspective of a resource consumer and provider, respectively, utilize a common terminology and syntax to express their preferences regarding the same resource (i.e., engine parts availability information). The basic concepts discussed in this section are derive from the authors’ previous work on personal data protection in passive network monitoring .…”
Section: Semantic Information Modelmentioning
confidence: 99%
“…Finally, the proposed model draws inspiration from previous works of the authors, notably OrBAC [10][27] [2] and PRISM [16][20] [19]. OrBAC provides a mature framework for managing contextual policies, and several extensions, e.g., for dynamically deploying security policies; PRISM is an access control approach specifically devised for network monitoring, although limited to singleprobe environments.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, it should be mentioned that the proposed approach draws inspiration from our previous works, notably OrBAC [38][39] [40] and PRISM [41][42] [2]. OrBAC provides a mature framework for managing contextual policies, and several extensions, e.g., for dynamically deploying security policies [40], whereas a privacy-enhancing version of OrBAC is presented in [43].…”
Section: Related Workmentioning
confidence: 99%