{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:24:44Z","timestamp":1742394284897},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_15","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T18:43:27Z","timestamp":1244227407000},"page":"234-251","source":"Crossref","is-referenced-by-count":3,"title":["A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy"],"prefix":"10.1007","author":[{"given":"Camilo H.","family":"Viecco","sequence":"first","affiliation":[]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"ACM SIGMOD","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy preserving data mining. In: ACM SIGMOD. ACM, New York (2000)"},{"key":"15_CR2","unstructured":"Bethencourt, J., Franklin, J., Vernon, M.: Mapping internet sensors with probe response attacks. In: Proceedings of the 14 USENIX Symposium. USENIX (August 2005)"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-44702-4_10","volume-title":"Designing Privacy Enhancing Technologies","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Flegel, U.: On pseudonymization of audit data for intrusion detection. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, p. 161. Springer, Heidelberg (2001)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Camp, L.J.: Reliable, usable signaling to defeat masquerade attacks. In: Workshop on the Economics of Information Security, Cambridge, UK (June 2006)","DOI":"10.2139\/ssrn.894973"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-45496-9_17","volume-title":"Information Hiding","author":"R. Clayton","year":"2001","unstructured":"Clayton, R., Danezis, G., Kuhn, M.G.: Real world patterns of failure in anonymity systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, p. 230. Springer, Heidelberg (2001)"},{"issue":"2","key":"15_CR6","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.comnet.2004.03.033","volume":"46","author":"J. Fan","year":"2004","unstructured":"Fan, J., Xu, J., Ammar, M.H., Moon, S.B.: Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme. Comput. Networks\u00a046(2), 253\u2013272 (2004)","journal-title":"Comput. Networks"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Flegel, U.: Pseudonymzing unix log files. In: Proceedings of the Infrastructure Security Conference (October 2002)","DOI":"10.1007\/3-540-45831-X_12"},{"key":"15_CR8","unstructured":"C.\u00a0C.\u00a0A. for Internet Data\u00a0Analysis. Caida website (July 2005), http:\/\/www.caida.org"},{"key":"15_CR9","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/1-4020-8090-5_8","volume-title":"Economics of Information Security","author":"E. Gal-Or","year":"2004","unstructured":"Gal-Or, E., Ghose, A.: The economic consequences of sharing security information. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, ch. 8, vol.\u00a012, pp. 95\u2013105. Springer, New York (2004)"},{"key":"15_CR10","unstructured":"GalOr, E., Ghose, A.: The economic consequences of sharing security information. In: Workshop on the Economics of Information Security (2003)"},{"key":"15_CR11","unstructured":"Gordon, L.A.: An economics perspective on the sharing of information related to security breaches: Concepts and empirical evidence. In: Workshop on the Economics of Information Security, Berkeley, CA, USA (May 2002)"},{"key":"15_CR12","unstructured":"Granick, J.: Faking it: Criminal sanctions and the cost of computer intrusions. I\/S A Journal of Law and Policy for the Information Society (2006)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Lakshmanan, L.V., Ng, R.T., Ramesh, G.: To do or not to do: The dilemma of disclosing anonymized data. In: SIGMOD, June 2005, pp. 61\u201372 (2005)","DOI":"10.1145\/1066157.1066165"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Locasto, M.E., Parekh, J.J., Keromytis, A.D., Stolfo, S.J.: Towards collaborative security and p2p intrusion detection. In: Information Assurance Workshop (June 2005)","DOI":"10.1109\/IAW.2005.1495971"},{"key":"15_CR15","unstructured":"Minshall, G.: Tcpdpriv man page (1997), http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html"},{"key":"15_CR16","unstructured":"Mulligan, D.K.: Information disclosure as a light-weight regulatory mechanism. In: DIMACS Economics of Information Security Workshop (2007)"},{"key":"15_CR17","unstructured":"T.\u00a0myNetWatchman Project. The mynetwatchman website, http:\/\/www.mynetwatchman.com"},{"key":"15_CR18","unstructured":"D.\u00a0of\u00a0Homeland\u00a0Security. Predict system"},{"key":"15_CR19","volume-title":"SIGCOMM 2003","author":"R. Pand","year":"2003","unstructured":"Pand, R., Paxson, V.: A high-level programming environment for packet trace anonymization and transformation. In: SIGCOMM 2003. ACM, New York (2003)"},{"key":"15_CR20","unstructured":"Patrick Lincoln, P.P., Shmatikov, V.: Privacy sharing and correlation of security alerts. In: Proc. USENIX Security 2004 (2004)"},{"key":"15_CR21","unstructured":"Pfleeger, S.L., Rue, R., Horwitz, J., Balakrishnan, A.: Investing in cyber security: The path to good practice. The RAND Journal (2006)"},{"key":"15_CR22","unstructured":"T.\u00a0H. Project. The honeynet project website"},{"key":"15_CR23","unstructured":"T.\u00a0H. Project. Know your enemy: Tracking botnets, http:\/\/www.honeynet.org\/papers\/bots\/"},{"key":"15_CR24","unstructured":"Research and E.\u00a0N. ISAC. REN-ISAC monitoring website"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoric metric for anonymity. In: 2002 Privacy Enhancing Technologies Workshop (2002)","DOI":"10.1007\/3-540-36467-6_4"},{"key":"15_CR26","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/1-4020-8090-5_10","volume-title":"Economics of Information Security","author":"A. Shostack","year":"2004","unstructured":"Shostack, A., Sylverson, P.: What price privacy? In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol.\u00a012, pp. 129\u2013142. Springer, New York (2004)"},{"key":"15_CR27","unstructured":"Simpson, C.: Neti@home website (August 2005), www.neti.gatech.edu"},{"key":"15_CR28","unstructured":"Sweeney, L.: Computational Disclosure Control: Aprimer on Data Privacy Protection. PhD thesis, Massachusetts Institute of Technology (June 2001)"},{"key":"15_CR29","first-page":"555","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-Based Systems\u00a010, 555\u2013570 (2002)","journal-title":"International Journal on Uncertainty Fuzziness and Knowledge-Based Systems"},{"key":"15_CR30","unstructured":"Ullrich, J., Consulting, E.: Dshield homepage (August 2005), www.dhield.org"},{"key":"15_CR31","unstructured":"M.\u00a0N. University\u00a0of Michigan and A.\u00a0Networks. University of michigan internet motion sensor (2005), http:\/\/ims.eecs.umich.edu"},{"key":"15_CR32","first-page":"355","volume-title":"Proc. of the ICEC 2003","author":"H. Varian","year":"2003","unstructured":"Varian, H.: System reliability and free riding. In: Sadeh, N. (ed.) Proc. of the ICEC 2003, pp. 355\u2013366. ACM Press, New York (2003)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T14:05:37Z","timestamp":1558361137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}