Computer Networks: The International Journal of Computer and Telecommunications Networking
The devil and packet trace anonymization
ACM SIGCOMM Computer Communication Review
Service oriented architectures: approaches, technologies and research issues
The VLDB Journal — The International Journal on Very Large Data Bases
Legal issues surrounding monitoring during network research
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Constraint based role based access control in the SECTET-framework: A model-driven approach
Journal of Computer Security - Privacy, Security and Trust (PST) Technologies: Evolution and Challenges
Modeling contextual security policies
International Journal of Information Security
Managing access and flow control requirements in distributed workflows
AICCSA '08 Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and Applications
The role of network trace anonymization under attack
ACM SIGCOMM Computer Communication Review
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Privacy-aware role-based access control
ACM Transactions on Information and System Security (TISSEC)
SecureSOA Modelling Security Requirements for Service-Oriented Architectures
SCC '10 Proceedings of the 2010 IEEE International Conference on Services Computing
Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Dynamic deployment of context-aware access control policies for constrained security devices
Journal of Systems and Software
A contextual privacy-aware access control model for network monitoring workflows: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
A privacy-aware access control model for distributed network monitoring
Computers and Electrical Engineering
Hi-index | 0.00 |
Despite the usefulness of network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. The inherent "leakage-proneness" is harshened due to the increasing complexity of the monitoring procedures and infrastructures, that include multiple traffic observation points, distributed mitigation mechanisms and even inter-operator cooperation. In this paper, an innovative approach aiming at realising the "privacy by design" principle in the area of network monitoring is presented; it relies on service-orientation primitives and abstractions, in order to verify and, when needed, to adjust network monitoring workflows, so that they become inherently privacy-aware before being deployed for execution.