{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:05:13Z","timestamp":1764079513061},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030383633"},{"type":"electronic","value":"9783030383640"}],"license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38364-0_30","type":"book-chapter","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T09:07:51Z","timestamp":1576746471000},"page":"335-345","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the Design of a Privacy Preserving Collaborative Platform for Cybersecurity"],"prefix":"10.1007","author":[{"given":"Thanh-Hai","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Herbert","sequence":"additional","affiliation":[]},{"given":"Sergiu","family":"Carpov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"key":"30_CR1","first-page":"868","volume-title":"Lecture Notes in Computer Science","author":"Zvika Brakerski","year":"2012","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Advances in Cryptology - CRYPTO 2012. Lecture Notes in Computer Science, pp. 868\u2013886 (2012)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS 2012 (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Carpov, S., Dubrulle, P., Sirdey, R.: Armadillo: a compilation chain for privacy preserving applications. In: Proceedings of the 3rd International Workshop on Security in Cloud Computing, pp. 13\u201319 (2015)","DOI":"10.1145\/2732516.2732520"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1016\/j.future.2019.06.026","volume":"102","author":"DW Chadwick","year":"2019","unstructured":"Chadwick, D.W., Fan, W., Constantino, G., Lemos, R.D., Cerbo, F.D., Herwono, I., Mori, P., Sajjad, A., Wang, X.S., Manea, M.: A cloud-edge based data security architecture for sharing and analyzing cyber threat information. Future Gener. Comput. Syst. 102, 710\u2013722 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: ASIACRYPT 2016, Part I, pp. 3\u201333. Springer (2016)","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"30_CR6","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive Report 2012\/144 (2012). \nhttp:\/\/eprint.iacr.org\/"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Fau, S., Sirdey, R., Fontaine, C., Melchor, C.A., Gogniat, G.: Towards practical program execution over fully homomorphic encryption schemes. In: 3PGCIC, pp. 284\u2013290 (2013)","DOI":"10.1109\/3PGCIC.2013.48"},{"key":"30_CR8","unstructured":"Fung, C.J., Boutaba, B.: Design and management of collaborative intrusion detection networks. In: IFIP\/IEEE International Symposium on Integrated Network Management (2013)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping. In: Proceedings of ASICACRYPT 2017. LNCS, vol. 10624, pp. 377\u2013408. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"30_CR10","volume-title":"Informed Consent: A Study of Decision Making in Psychiatry","author":"CW Lidz","year":"1984","unstructured":"Lidz, C.W.: Informed Consent: A Study of Decision Making in Psychiatry. Guilford, New York (1984)"},{"key":"30_CR11","unstructured":"McAfee: Common Event Format - McAfee, September 2018. \nhttps:\/\/kc.mcafee.com\/resources\/sites\/MCAFEE\/content"},{"issue":"2","key":"30_CR12","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/MSP.2012.2230219","volume":"30","author":"CA Melchor","year":"2013","unstructured":"Melchor, C.A., Fau, S., Fontaine, C., Gogniat, G., Sirdey, R.: Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Sig. Process. Mag. 30(2), 108\u2013117 (2013)","journal-title":"IEEE Sig. Process. Mag."},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Nabeel, M., Shang, N., Bertino, E.: Efficient privacy preserving content based publish subscribe systems. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012). ACM, New York (2012)","DOI":"10.1145\/2295136.2295164"},{"key":"30_CR14","unstructured":"Trimintzios, P., Gavrila, R.: On national and international cyber security exercises: survey, analysis and recommendations. ENISA European Union Agency for Cybersecurity (2012). \nhttp:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/cyber-crisis-cooperation\/cce\/cyber-exercises\/exercise-survey2012"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Pires, R., Pasin, M., Felber, P., Fetzer, C.: Secure content-based routing using Intel software guard extensions. In: Proceedings of the 17th International Middleware Conference (Middleware 2016). ACM, New York (2016)","DOI":"10.1145\/2988336.2988346"},{"key":"30_CR16","unstructured":"Richardson, E.L., Weinberger, C.W.: Records, computers, and the rights of citizens. U.S. Department of Health, Education, and Welfare (1973)"},{"key":"30_CR17","unstructured":"C.L. team: Homomorphic encryption technology. github (2018)"},{"key":"30_CR18","unstructured":"UNISS: Cybersecurity policies and critical infrastructure protection (2018). \nhttps:\/\/uniss.org\/cyber-security-policies-and-critical-infrastructure-protection\/"},{"key":"30_CR19","unstructured":"NISP WG2: NISP WG2 plenary report information sharing and incident notification. Network and Information Security Group (2013)"},{"key":"30_CR20","unstructured":"eHealth Acceptance Factors and KONFIDO Adaptation Strategy (2018). \nhttps:\/\/konfido-project.eu"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computational Methods for Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38364-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T09:16:44Z","timestamp":1576747004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38364-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"ISBN":["9783030383633","9783030383640"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38364-0_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"20 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSAMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Science, Applied Mathematics and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsama2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.lita.univ-lorraine.fr\/~iccsama2019\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}