A contextual privacy-aware access control model for network monitoring workflows: Work in progress

Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Network monitoring activities are surrounded by serious privacy implications. The inherent leakage-proneness is harshened due to the increasing complexity of the monitoring procedures and infrastructures, that may include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. In this paper, we report a work in progress policy model that aims at addressing these concernes, by verifying access requests from network monitoring workflows, with privacy features already contained since their specification phase. We survey related work, outline some of their limitations, and describe an early version of our proposal.

Original languageEnglish
Title of host publicationFoundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Revised Selected Papers
Pages208-217
Number of pages10
DOIs
Publication statusPublished - 27 Jan 2012
Externally publishedYes
Event4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011 - Paris, France
Duration: 12 May 201113 May 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6888 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011
Country/TerritoryFrance
CityParis
Period12/05/1113/05/11

Keywords

  • Network monitoring
  • access control
  • context
  • privacy
  • workflows

Fingerprint

Dive into the research topics of 'A contextual privacy-aware access control model for network monitoring workflows: Work in progress'. Together they form a unique fingerprint.

Cite this