{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T04:34:27Z","timestamp":1742358867642,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279003"},{"type":"electronic","value":"9783642279010"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27901-0_16","type":"book-chapter","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T02:01:25Z","timestamp":1326765685000},"page":"208-217","source":"Crossref","is-referenced-by-count":2,"title":["A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress"],"prefix":"10.1007","author":[{"given":"Eugenia I.","family":"Papagiannakopoulou","sequence":"first","affiliation":[]},{"given":"Maria N.","family":"Koukovini","sequence":"additional","affiliation":[]},{"given":"Georgios V.","family":"Lioudakis","sequence":"additional","affiliation":[]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[]},{"given":"Dimitra I.","family":"Kaklamani","sequence":"additional","affiliation":[]},{"given":"Iakovos S.","family":"Venieris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: VLDB 2002: Proceedings of the 28th International Conference on Very Large Data Bases, pp. 143\u2013154. VLDB Endowment (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-11207-2_10","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"N. Ajam","year":"2010","unstructured":"Ajam, N., Cuppens-Boulahia, N., Cuppens, F.: Contextual Privacy Management in Extended Role Based Access Control Model. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) DPM 2009. LNCS, vol.\u00a05939, pp. 121\u2013135. Springer, Heidelberg (2010)"},{"issue":"2","key":"16_CR3","doi-asserted-by":"publisher","first-page":"223","DOI":"10.3233\/JCS-2008-16206","volume":"16","author":"M. Alam","year":"2008","unstructured":"Alam, M., Hafner, M., Breu, R.: Constraint based role based access control in the sectet-framework a model-driven approach. Journal of Computer Security\u00a016(2), 223\u2013260 (2008)","journal-title":"Journal of Computer Security"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Antonakopoulou, A., Lioudakis, G.V., Gogoulos, F., Kaklamani, D.I., Venieris, I.S.: Leveraging access control for privacy protection: A survey. In: Yee, G. (ed.) Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global (2011)","DOI":"10.4018\/978-1-61350-501-4.ch003"},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3233\/JCS-2010-0367","volume":"18","author":"C.A. Ardagna","year":"2010","unstructured":"Ardagna, C.A., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting cryptography for privacy-enhanced access control: A result of the prime project. Journal of Computer Security\u00a018(1), 123\u2013160 (2010)","journal-title":"Journal of Computer Security"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Ayed, S., Cuppens-Boulahia, N., Cuppens, F.: Deploying security policy in intra and inter workflow management systems. In: International Conference on Availability, Reliability and Security, pp. 58\u201365 (2009)","DOI":"10.1109\/ARES.2009.152"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/637201.637243","volume-title":"IMW 2002: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment","author":"S.M. Bellovin","year":"2002","unstructured":"Bellovin, S.M.: A technique for counting NATted hosts. In: IMW 2002: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pp. 267\u2013272. ACM, New York (2002)"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1672308.1672310","volume":"40","author":"M. Burkhart","year":"2010","unstructured":"Burkhart, M., Schatzmann, D., Trammell, B., Boschi, E., Plattner, B.: The role of network trace anonymization under attack. SIGCOMM Computer Communications Review\u00a040(1), 5\u201311 (2010)","journal-title":"SIGCOMM Computer Communications Review"},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s00778-006-0023-0","volume":"17","author":"J.W. Byun","year":"2008","unstructured":"Byun, J.W., Li, N.: Purpose based access control for privacy protection in relational database systems. The VLDB Journal\u00a017(4), 603\u2013619 (2008)","journal-title":"The VLDB Journal"},{"issue":"4","key":"16_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F. Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling Contextual Security Policies. International Journal of Information Security\u00a07(4), 285\u2013305 (2008)","journal-title":"International Journal of Information Security"},{"key":"16_CR11","unstructured":"European Parliament and Council: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities L 281, 31\u201350 (November 1995)"},{"key":"16_CR12","unstructured":"European Parliament and Council: Directive 2002\/58\/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). Official Journal of the European Communities L 201, 37\u201347 (July 2002)"},{"key":"16_CR13","unstructured":"European Parliament and Council: Directive 2006\/24\/EC of the European Parliament and of the Council of 15, March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC. Official Journal of the European Communities L 105, 54\u201363 (April 2006)"},{"issue":"2","key":"16_CR14","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.comnet.2004.03.033","volume":"46","author":"J. Fan","year":"2004","unstructured":"Fan, J., Xu, J., Ammar, M.H., Moon, S.B.: Prefix-preserving IP address anonymization. Computer Networks\u00a046(2), 253\u2013272 (2004)","journal-title":"Computer Networks"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Foukarakis, M., Antoniades, D., Antonatos, S., Markatos, E.: Flexible and high-performance anonymization of NetFlow records using anontool. In: SECURECOMM Conference (2007)","DOI":"10.1109\/SECCOM.2007.4550304"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Gogoulos, F., Antonakopoulou, A., Lioudakis, G.V., Mousas, A.S., Kaklamani, D.I., Venieris, I.S.: Privacy-aware access control and authorization in passive network monitoring infrastructures. In: CIT 2010: Proceedings of the 10th IEEE International Conference on Computer and Information Technology (2010)","DOI":"10.1109\/CIT.2010.203"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Koukis, D., Antonatos, S., Antoniades, D., Markatos, E., Trimintzios, P.: A generic anonymization framework for network traffic. In: IEEE International Conference on Communications, ICC 2006, vol.\u00a05, pp. 2302\u20132309 (2006)","DOI":"10.1109\/ICC.2006.255113"},{"key":"16_CR18","unstructured":"Li, Y., Slagell, A., Luo, K., Yurcik, W.: Canine: A combined conversion and anonymization tool for processing netflows for security. In: International Conference on Telecommunication Systems Modeling and Analysis (2005)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Lioudakis, G.V., Gaudino, F., Boschi, E., Bianchi, G., Kaklamani, D.I., Venieris, I.S.: Legislation-aware privacy protection in passive network monitoring. In: Portela, I.M., Cruz-Cunha, M.M. (eds.) Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues, ch. 22, pp. 363\u2013383. IGI Global (2010)","DOI":"10.4018\/978-1-61520-975-0.ch022"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Lioudakis, G.V., Gogoulos, F., Antonakopoulou, A., Mousas, A.S., Venieris, I.S., Kaklamani, D.I.: An access control approach for privacy-preserving passive network monitoring. In: ICITST 2009: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions (November 2009)","DOI":"10.1109\/ICITST.2009.5402632"},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1007\/978-3-540-88873-4_12","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"A. Masoumzadeh","year":"2008","unstructured":"Masoumzadeh, A., Joshi, J.: Purbac: Purpose-Aware Role-Based Access Control. In: Meersman, R., Tari, Z. (eds.) OTM 2008. LNCS, vol.\u00a05332, pp. 1104\u20131121. Springer, Heidelberg (2008)"},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/s00778-006-0009-y","volume":"15","author":"F. Massacci","year":"2006","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. The VLDB Journal\u00a015, 370\u2013387 (2006)","journal-title":"The VLDB Journal"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Menzel, M., Meinel, C.: SecureSOA. In: IEEE International Conference on Services Computing, pp. 146\u2013153 (2010)","DOI":"10.1109\/SCC.2010.63"},{"key":"16_CR24","unstructured":"Minshall, G.: Tcpdpriv, http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html"},{"issue":"3","key":"16_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1805974.1805980","volume":"13","author":"Q. Ni","year":"2010","unstructured":"Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.M., Karat, J., Trombetta, A.: Privacy-aware role-based access control. ACM Transactions on Information and System Security\u00a013(3), 1\u201331 (2010)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"16_CR26","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1111322.1111330","volume":"36","author":"R. Pang","year":"2006","unstructured":"Pang, R., Allman, M., Paxson, V., Lee, J.: The devil and packet trace anonymization. Computer Communication Review (CCR)\u00a036(1), 29\u201338 (2006)","journal-title":"Computer Communication Review (CCR)"},{"key":"16_CR27","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.jss.2011.02.005","volume":"84","author":"S. Preda","year":"2011","unstructured":"Preda, S., Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J., Toutain, L.: Dynamic deployment of context-aware access control policies for constrained security devices. J. Syst. Softw.\u00a084, 1144\u20131159 (2011)","journal-title":"J. Syst. Softw."},{"key":"16_CR28","first-page":"111","volume-title":"WAINA 2008: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops","author":"G. Russello","year":"2008","unstructured":"Russello, G., Dong, C., Dulay, N.: A workflow-based access control framework for e-health applications. In: WAINA 2008: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications Workshops, pp. 111\u2013120. IEEE Computer Society, Washington, DC (2008), http:\/\/portal.acm.org\/citation.cfm?id=1395080.1395523"},{"key":"16_CR29","first-page":"141","volume-title":"IMC 2007: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement","author":"D.C. Sicker","year":"2007","unstructured":"Sicker, D.C., Ohm, P., Grunwald, D.: Legal issues surrounding monitoring during network research. In: IMC 2007: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 141\u2013148. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27901-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T22:02:15Z","timestamp":1742335335000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27901-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279003","9783642279010"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27901-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}