{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:24:15Z","timestamp":1740097455082,"version":"3.37.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_20","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:37:01Z","timestamp":1477096621000},"page":"285-304","source":"Crossref","is-referenced-by-count":4,"title":["Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Metoui","sequence":"first","affiliation":[]},{"given":"Michele","family":"Bezzi","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Armando","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"20_CR1","series-title":"LNCS (ISAIH)","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1007\/978-3-319-26148-5_45","volume-title":"OTM 2015","author":"A Armando","year":"2015","unstructured":"Armando, A., Bezzi, M., Cerbo, F., Metoui, N.: Balancing trust and risk in access control. In: Debruyne, C., Panetto, H., Meersman, R., Dillon, T., Weichhart, G., An, Y., Ardagna, C.A. (eds.) OTM 2015. LNCS (ISAIH), vol. 9415, pp. 660\u2013676. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26148-5_45"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-319-17016-9_17","volume-title":"Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance","author":"A Armando","year":"2015","unstructured":"Armando, A., Bezzi, M., Metoui, N., Sabetta, A.: Risk-aware information disclosure. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA\/SETOP -2014. LNCS, vol. 8872, pp. 266\u2013276. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-17016-9_17"},{"issue":"2","key":"20_CR3","doi-asserted-by":"crossref","first-page":"70","DOI":"10.4018\/IJSSE.2015040104","volume":"6","author":"A Armando","year":"2015","unstructured":"Armando, A., Bezzi, M., Metoui, N., Sabetta, A.: Risk-based privacy-aware information disclosure. Int. J. Secur. Softw. Eng. 6(2), 70\u201389 (2015). http:\/\/dx.doi.org\/10.4018\/IJSSE.2015040104","journal-title":"Int. J. Secur. Softw. Eng."},{"issue":"3","key":"20_CR4","first-page":"199","volume":"3","author":"M Bezzi","year":"2010","unstructured":"Bezzi, M.: An information theoretic approach for privacy metrics. Trans. Data Priv. 3(3), 199\u2013215 (2010)","journal-title":"Trans. Data Priv."},{"key":"20_CR5","unstructured":"Brickell, J., Shmatikov, V.: The cost of privacy: destruction of data-mining utility in anonymized data publishing. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008, pp. 70\u201378. ACM, NewYork (2008). http:\/\/doi.acm.org\/10.1145\/1401890.1401904"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-29963-6_11","volume-title":"Security and Trust Management","author":"L Chen","year":"2012","unstructured":"Chen, L., Crampton, J.: Risk-aware role-based access control. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 140\u2013156. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-29963-6_11"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Chen, L., Crampton, J., Kollingbaum, M.J., Norman, T.J.: Obligations in risk-aware access control. In: Cuppens-Boulahia, N., Fong, P., Garc\u00eda-Alfaro, J., Marsh, S., Stegh\u00f6fer, J. (eds.) PST, pp. 145\u2013152. IEEE (2012). http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=6287257","DOI":"10.1109\/PST.2012.6297931"},{"key":"20_CR8","unstructured":"Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: an experiment on quantified risk-adaptive access control. In: IEEE Symposium on Security and Privacy, pp. 222\u2013230. IEEE Computer Society (2007). http:\/\/dblp.uni-trier.de\/db\/conf\/sp\/sp. 2007.html#ChengRKKWR07"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Theory of privacy and anonymity. In: Atallah, M., Blanton, M. (eds.) Algorithms and Theory of Computation Handbook, 2nd edn. CRC Press (2009)","DOI":"10.1201\/9781584888215-c18"},{"issue":"2","key":"20_CR10","first-page":"161","volume":"6","author":"C Clifton","year":"2013","unstructured":"Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Trans. Data Priv. 6(2), 161\u2013183 (2013). http:\/\/dl.acm.org\/citation.cfm?id=2612167.2612170","journal-title":"Trans. Data Priv."},{"key":"20_CR11","unstructured":"Committee on Strategies for Responsible Sharing of Clinical Trial Data: Sharing Clinical Trial Data: Maximizing Benefits, Minimizing Risk. National Academies Press (US), Washington (DC) (2015)"},{"key":"20_CR12","unstructured":"Dickens, L., Russo, A., Cheng, P.C., Lobo, J.: Towards learning risk estimation functions for access control. In: Snowbird Learning Workshop (2010). https:\/\/www.usukitacs.com\/papers\/6006\/TA2_22_Dickens_learning_risk_estimation.pdf"},{"key":"20_CR13","unstructured":"FRA and the Council of Europe: handbook on european data protection law. Technical report (2014)"},{"key":"20_CR14","doi-asserted-by":"crossref","DOI":"10.4324\/9781315766645","volume-title":"Privacy and Security in the Digital Age: Privacy in the Age of Super-Technologies","author":"M Friedewald","year":"2016","unstructured":"Friedewald, M., Pohoryles, R.J.: Privacy and Security in the Digital Age: Privacy in the Age of Super-Technologies. Routledge, Abingdon (2016)"},{"issue":"4","key":"20_CR15","first-page":"14:1","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14:1\u201314:53 (2010). http:\/\/doi.acm.org\/10.1145\/1749603.1749605","journal-title":"ACM Comput. Surv."},{"key":"20_CR16","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of the 33rd International Conference on Very Large Data Bases, pp. 758\u2013769 (2007). VLDB Endowment"},{"issue":"2","key":"20_CR17","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A Josang","year":"2007","unstructured":"Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618\u2013644 (2007). Emerging issues in Collaborative Commerce. http:\/\/www.sciencedirect.com\/science\/article\/B6V8S-4GJK82P-1\/2\/a9a6e96414fa04641c1d31a57989618d","journal-title":"Decision Support Systems"},{"key":"20_CR18","unstructured":"Kaempfer, M.: (2015). http:\/\/scn.sap.com\/community\/security\/blog\/2015\/03\/04\/sap-enterprise-threat-detection-and-siem-is-this-not-the-same"},{"key":"20_CR19","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.jbi.2013.12.002","volume":"50","author":"F Kohlmayer","year":"2014","unstructured":"Kohlmayer, F., Prasser, F., Eckert, C., Kuhn, K.A.: A flexible approach to distributed data anonymization. J. Biomed. Inform. 50, 62\u201376 (2014). Special issue on Informatics Methods in Medical Privacy","journal-title":"J. Biomed. Inform."},{"key":"20_CR20","unstructured":"Kounine, A., Bezzi, M.: Assessing disclosure risk in anonymized datasets. In: Proceedings of the FloCon Workshop, January 2009"},{"key":"20_CR21","unstructured":"Lakkaraju, K., Slagell, A.: Evaluating the utility of anonymized network traces for intrusion detection. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, SecureComm 2008, pp. 17:1\u201317:8. ACM, NewYork (2008). http:\/\/doi.acm.org\/10.1145\/1460877.1460899"},{"issue":"6","key":"20_CR22","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.jpdc.2011.01.007","volume":"71","author":"X Li","year":"2011","unstructured":"Li, X., Zhou, F., Yang, X.: A multi-dimensional trust evaluation model for large-scale p2p computing. J. Parallel Distrib. Comput. 71(6), 837\u2013847 (2011)","journal-title":"J. Parallel Distrib. Comput."},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Mivule, K., Anderson, B.: A study of usability-aware network trace anonymization. In: Science and Information Conference (SAI), 2015, pp. 1293\u20131304. IEEE (2015)","DOI":"10.1109\/SAI.2015.7237310"},{"key":"20_CR24","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/978-94-017-7376-8_13","volume-title":"Data Protection on the Move","author":"A Narayanan","year":"2016","unstructured":"Narayanan, A., Huey, J., Felten, E.W.: A precautionary approach to big data privacy. In: Gutwirth, S., Leenes, R., De Hert, P. (eds.) Data Protection on the Move, vol. 24, pp. 357\u2013385. Springer, Dordrecht (2016)"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Oprea, A., Li, Z., Yen, T.F., Chin, S.H., Alrwais, S.: Detection of early-stage enterprise infection by mining large-scale log data. In: 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 45\u201356. IEEE (2015)","DOI":"10.1109\/DSN.2015.14"},{"issue":"6","key":"20_CR26","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Scholl, M.A., Stine, K.M., Hash, J., Bowen, P., Johnson, L.A., Smith, C.D., Steinberg, D.I.: Spp. 800\u201366 rev. 1. an introductory resource guide for implementing the health insurance portability and accountability act (hipaa) security rule. Technical report (2008)","DOI":"10.6028\/NIST.SP.800-66r1"},{"issue":"4","key":"20_CR28","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.cose.2012.02.006","volume":"31","author":"RA Shaikh","year":"2012","unstructured":"Shaikh, R.A., Adi, K., Logrippo, L.: Dynamic risk-based decision access control systems. Comput. Secur. 31(4), 447\u2013464 (2012)","journal-title":"Comput. Secur."},{"key":"20_CR29","unstructured":"Templ, M., Meindl, B., Kowarik, A.: Introduction to statistical disclosure control (sdc). Project: Relative to the testing of SDC algorithms and provision of practical SDC, data analysis OG (2013)"},{"key":"20_CR30","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.A.: Measuring privacy leakage for IDS rules. CoRR abs\/1308.5421. http:\/\/arxiv.org\/abs\/1308.5421 (2013)"},{"issue":"3","key":"20_CR31","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s11277-010-0069-6","volume":"57","author":"N Ulltveit-Moe","year":"2011","unstructured":"Ulltveit-Moe, N., Oleshchuk, V.A., K\u00f8ien, G.M.: Location-aware mobile intrusion detection with enhanced privacy in a 5G context. Wireless Pers. Commun. 57(3), 317\u2013338 (2011)","journal-title":"Wireless Pers. Commun."},{"key":"20_CR32","volume-title":"Privacy Preserving Data Mining","author":"J Vaidya","year":"2006","unstructured":"Vaidya, J., Clifton, C.W., Zhu, Y.M.: Privacy Preserving Data Mining, vol. 19. Springer, New York (2006)"},{"issue":"1","key":"20_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-015-0013-4","volume":"2","author":"R Zuech","year":"2015","unstructured":"Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 1\u201341 (2015)","journal-title":"J. Big Data"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:47:51Z","timestamp":1568486871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}