• DocumentCode
    2551887
  • Title

    Visualising Access Control: The PRISM Approach

  • Author

    Mousas, Aziz S. ; Antonakopoulou, Anna ; Gogoulos, Fotios ; Lioudakis, Georgios V. ; Kaklamani, Dimitra I. ; Venieris, Iakovos S.

  • Author_Institution
    Sch. of Electr. & Comput. Eng., Nat. Tech. Univ. of Athens, Athens, Greece
  • fYear
    2010
  • fDate
    10-12 Sept. 2010
  • Firstpage
    107
  • Lastpage
    111
  • Abstract
    Despite the usefulness of passive network monitoring for the operation, maintenance, control and protection of communication networks, as well as law enforcement, network monitoring activities are surrounded by serious privacy implications. In this paper, a software tool for the management of privacy-preserving authorisation and access control to data originating from passive network monitoring is described. It offers a user-friendly, visual interface for the specification of the underlying concepts, such as roles, data types, actions, rules and contextual information, providing the appropriate level of abstraction. Based on the specified model, the proposed application generates the cryptographic means for the dissemination of the provisions to the enforcing entities, while relying on an ontological model for the representation of the access control policies.
  • Keywords
    authorisation; cryptography; data visualisation; software tools; system monitoring; PRISM approach; access control; communication networks; cryptographic means; passive network monitoring; privacy-preserving authorisation; software tool; Authorization; Iron; Monitoring; OWL; Ontologies; Semantics; access control; network monitoring; ontology visualisation; policies specification application; privacy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Informatics (PCI), 2010 14th Panhellenic Conference on
  • Conference_Location
    Tripoli
  • Print_ISBN
    978-1-4244-7838-5
  • Type

    conf

  • DOI
    10.1109/PCI.2010.52
  • Filename
    5600457