TY - GEN
T1 - Leveraging ontologies upon a holistic privacy-aware access control model
AU - Papagiannakopoulou, Eugenia I.
AU - Koukovini, Maria N.
AU - Lioudakis, Georgios V.
AU - Dellas, Nikolaos
AU - Garcia-Alfaro, Joaquin
AU - Kaklamani, Dimitra I.
AU - Venieris, Iakovos S.
AU - Cuppens-Boulahia, Nora
AU - Cuppens, Frédéric
PY - 2014/1/1
Y1 - 2014/1/1
N2 - Access control is a crucial concept in both ICT security and privacy, providing for the protection of system resources and personal data. The increasing complexity of nowadays systems has led to a vast family of solutions fostering comprehensive access control models, with the ability to capture a variety of parameters and to incorporate them in the decision making process. However, existing approaches are characterised by limitations regarding expressiveness. We present an approach that aims at overcoming such limitations. It is fully based on ontologies and grounded on a rich in semantics information model. The result is a privacy-aware solution that takes into consideration a variety of aspects and parameters, including attributes, context, dependencies between actions and entities participating therein, as well as separation and binding of duty constraints.
AB - Access control is a crucial concept in both ICT security and privacy, providing for the protection of system resources and personal data. The increasing complexity of nowadays systems has led to a vast family of solutions fostering comprehensive access control models, with the ability to capture a variety of parameters and to incorporate them in the decision making process. However, existing approaches are characterised by limitations regarding expressiveness. We present an approach that aims at overcoming such limitations. It is fully based on ontologies and grounded on a rich in semantics information model. The result is a privacy-aware solution that takes into consideration a variety of aspects and parameters, including attributes, context, dependencies between actions and entities participating therein, as well as separation and binding of duty constraints.
UR - https://www.scopus.com/pages/publications/84958534385
U2 - 10.1007/978-3-319-05302-8_13
DO - 10.1007/978-3-319-05302-8_13
M3 - Conference contribution
AN - SCOPUS:84958534385
SN - 9783319053011
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 209
EP - 226
BT - Foundations and Practice of Security - 6th International Symposium, FPS 2013, Revised Selected Papers
PB - Springer Verlag
T2 - 6th International Symposium on Foundations and Practice of Security, FPS 2013
Y2 - 21 October 2013 through 22 October 2013
ER -