Author of the publication

Privacy Protection in Passive Network Monitoring: An Access Control Approach.

, , , , and . AINA Workshops, page 109-116. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified signalling using SIP in a B3G system., , , , , and . PIMRC, page 1667-1671. IEEE, (2005)Privacy-Aware Passive Network Monitoring., , , , , and . Panhellenic Conference on Informatics, page 171-175. IEEE Computer Society, (2009)A middleware architecture for privacy protection, , , , , , , and . Computer Networks, 51 (16): 4679--4696 (2007)An access control approach for privacy-preserving passive network monitoring., , , , , and . ICITST, page 1-8. IEEE, (2009)Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model., , , , , , , , and . FPS, volume 8352 of Lecture Notes in Computer Science, page 209-226. Springer, (2013)On the use of Attribute-Based Encryption for multimedia content protection over Information-Centric Networks., , , , , and . Trans. Emerg. Telecommun. Technol., 25 (4): 422-435 (2014)The COG-LO Framework: IoT-based COGnitive Logistic Operations for next generation logistics., , , , , , and . WF-IoT, page 117-121. IEEE, (2019)A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring., , , , and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 295-302. Springer, (2011)A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress., , , , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 208-217. Springer, (2011)Routing in Content-Centric Networks: From Names to Concepts., , , , , and . NTMS, page 1-5. IEEE, (2012)