
Anna Felkner- PhD
- NASK National Research Institute
Anna Felkner
- PhD
- NASK National Research Institute
About
27
Publications
3,761
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
132
Citations
Introduction
Current institution
Publications
Publications (27)
The article’s primary purpose is to highlight the importance of cybersecurity for Internet of Things (IoT) devices. Due to the widespread use of such devices in everyone’s daily and professional lives, taking care of their security is essential. This security can be strengthened by raising awareness about the vulnerabilities and risks of these devi...
The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to possible threats. One of the areas which should be...
The third chapter contains the description of the most important research and innovation aspects regarding cybersecurity and privacy. The first two sections have mainly descriptive character, and regard the area of research funding and the area of substantive research directions. The last two sections, in contrast, provide some conclusions regardin...
The chapter examines the state of play of the policy initiatives for both European Union and japan. It does so by offering an high-level comparative analysis of the main legal and policy frameworks on privacy, data protection and cybersecurity applying in the two regions, for the benefit of policy-makers and research experts in the technical and le...
The chapter focuses on the analysis of the output of clusters and industry associations. It also includes descriptions of national strategic efforts for creating or developing business strategies. With respect to standards, it covers a large scope of standard bodies.
This book contains the key findings related to cybersecurity research analysis for Europe and Japan collected during the EUNITY project.
A wide-scope analysis of the synergies and differences between the two regions, the current trends and challenges is provided. The survey is multifaceted, including the relevant legislation, policies and cybersecu...
The security of the Internet of Things (IoT) is an important yet often overlooked subject. Specifically, the publicly available information sources about vulnerabilities affecting the connected devices are unsatisfactory. Our research shows that, while the information is available on the Internet, there is no single service offering data focused on...
The main idea behind creating SpiderTrap was to build a website that can track how Internet bots crawl it. To track bots, honeypot dynamically generates different types of the hyperlinks on the web pages leading from one article to another and logs information passed by web clients in HTTP requests when visiting these links. By analyzing the sequen...
This article is focused on the family of role-based trust management languages (RT). Trust management languages are a useful method of representing security credentials and policies in large distributed access control mechanisms. They provide sets of credentials that are assigned to individual roles performed by the specific entities. These credenti...
Real-time assessment of IT-related risks, performed at the national level, is very important due to the evolving nature of threats that may originate from individual hackers, organized cyber-criminal groups, as well as state activities. Evaluation of risk that is based on technical information, as well as on mutual relationships between various ins...
Trust management is a unified approach to access control in open distributed systems, where decisions connected with access control are based on policy statements made by many principals. The family of Role-based Trust management languages (RT) is an effective means for representing security policies, credentials and relationship in distributed, de...
This paper presents a new concept of an approach to risk assessment which can be done on the basis of publicly available information about vulnerabilities. The presented approach uses also the notion of trust and implements many concepts used in so called trust and reputation management systems (which are widely used in WSN, MANET or P2P networks,...
The topic of this paper is the family of Role-based Trust management languages (RT) which is used for representing security policies and credentials in decentralized, distributed, large scale access control systems. The goal of this paper is to explore the potential of RT languages. It shows how security policies can be made more realistic by inclu...
The family of Role-based Trust management languages is used for representing security policies by defining a formalism, which uses credentials to handle trust in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The...
Trust plays an important role in human life envi-ronments. That is why the researchers has been focusing on it for a long time. It allows us to delegate tasks and decisions to an appropriate person. In social sciences trust between humans was studied, but it also was analyzed in economic transactions. A lot of computer scientists from different ar-...
Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentralized environments, where the requester and servi...
The topic of this paper is RTT
, a language from the family of Role-based Trust management (RT) languages, which is used for representing security policies and credentials in distributed large scale access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authori...
The paper presents the recently started project which aims to develop a secure environment for processing of restricted information.
The solution being developed by the consortium employs virtualization to allow data from different security domains to be
processed on the same physical machine. The system can host Windows and Linux systems as secure...
Bioinformatics is a large group of methods used in biology, mostly for analysis of gene sequences. The algorithms developed for this task have recently found a new application in network threat detection. This paper is an introduction to this area of research, presenting a survey of bioinformatics methods applied to this task, outlining the individ...
Role-based trust management languages define a formalism, which uses credentials to handle trust in decentralized, distributed access control systems. A credential provides information about the privileges of users and the security policies issued by one or more trusted authorities. The main topic of this paper is RT T , a language which supports m...
Role-based Trust management (RT) languages are used for representing policies and credentials in decentralized, distributed access control systems. RT languages combine trust management and role-based access control features. A credential provides information about the keys, rights and qualifications from one or more trusted authorities. The paper...
Crisis management benefits tremendously from simulation, especially during the planning and testing. At the same time an often
overlooked aspect of crisis management is the key role of telecommunication. This paper describes the work done at NASK with
the goal of implementing a simulator of the consequences of threats to the ICT (Information and Co...
This paper is a survey of studies of modeling access control and trust management. Access control is an important requirement of information systems. Role Based Access Control (RBAC) is the most flexible type of access control policy. It is a model of access control in enterprise information systems. It uses a user role to control which users have...