{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:05:20Z","timestamp":1766268320764},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T00:00:00Z","timestamp":1432598400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10207-015-0292-y","type":"journal-article","created":{"date-parts":[[2015,5,25]],"date-time":"2015-05-25T14:49:52Z","timestamp":1432565392000},"page":"235-250","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality"],"prefix":"10.1007","volume":"15","author":[{"given":"Tytus","family":"Kurek","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Niemiec","sequence":"additional","affiliation":[]},{"given":"Artur","family":"Lason","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,26]]},"reference":[{"key":"292_CR1","first-page":"3","volume-title":"Handbook of Cloud Computing","author":"B Furth","year":"2010","unstructured":"Furth, B.: Cloud computing fundamentals. In: Furth, B., Escalante, A. (eds.) Handbook of Cloud Computing, pp. 3\u201320. Springer, New York (2010)"},{"key":"292_CR2","unstructured":"SecaaS Working Group: Defined Categories of Service (2011). Cloud Security Aliance (CSA). https:\/\/cloudsecurityalliance.org\/wp-content\/uploads\/2011\/09\/SecaaS_V1_0 (2011). Accessed 1 Aug 2014"},{"key":"292_CR3","unstructured":"AT&T Intellectual Property: Managed Firewall Service Network-Based. AT&T, Inc. http:\/\/www.business.att.com\/content\/productbrochures\/Network-Based-Firewall (2014). Accessed 1 Aug 2014"},{"key":"292_CR4","unstructured":"Virtela Inc: Virtela Enterprise Services Cloud (ESC). Virtela, Inc. http:\/\/www.virtela.net\/services\/virtela-esc\/ (2013). Accessed 1 Oct 2013"},{"key":"292_CR5","unstructured":"VMware Inc: Business and Financial Benefits of Virtualization. VMware, Inc. http:\/\/www.vmware.com\/files\/pdf\/cloud-journey\/VMware-Business-Financial-Benefits-Virtualization-Whitepaper (2011). Accessed 1 Aug (2014)"},{"key":"292_CR6","unstructured":"Websence Inc: Seven Criteria for Evaluating Security-as-a-Service (SaaS) Solutions. Websence, Inc. http:\/\/www.websense.com\/assets\/white-papers\/whitepaper-seven-criteria-for-evaluation-security-as-a-service-solutions-en (2010). Accessed 1 Aug 2014"},{"key":"292_CR7","doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W., Qian, W. and Zhou, A.: Security and privacy in cloud computing: a survey. In: 6th International Conference on Semantics, Knowledge and Grids, pp. 105\u2013112 (2010)","DOI":"10.1109\/SKG.2010.19"},{"key":"292_CR8","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering, pp. 647\u2013651 (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"292_CR9","doi-asserted-by":"crossref","unstructured":"Kurek, T., Lason, A., Niemiec, M.: First step towards preserving the privacy of cloud-based IDS security policies. Secur. Comm. Netw. 9999 (2015). doi: 10.1002\/sec.1272","DOI":"10.1002\/sec.1272"},{"key":"292_CR10","unstructured":"Trustwave SpiderLabs: 2012 Global Security Report. Trustwave Holdings, Inc. http:\/\/www2.trustwave.com\/rs\/trustwave\/images\/2012-Global-Security-Report (2012). Accessed 1 Oct 2013"},{"key":"292_CR11","unstructured":"Trustwave SpiderLabs: 2013 Global Security Report. Trustwave Holdings, Inc. http:\/\/www2.trustwave.com\/rs\/trustwave\/images\/2013-Global-Security-Report (2013). Accessed 1 Aug 2014"},{"key":"292_CR12","unstructured":"Scoop Media: Survey: 88\u00a0% of ICT Employees Would Steal. Scoop Top Stories. http:\/\/www.scoop.co.nz\/stories\/BU0811\/S00203.htm (2008). Accessed 1 Aug 2014"},{"key":"292_CR13","unstructured":"McAfee, R.B., Champagne, P.J.: Effectively Managing Troublesome Employees, Westport (1994)"},{"key":"292_CR14","doi-asserted-by":"crossref","unstructured":"Khakpour, A.R., Liu, A.X.: First step toward cloud-based firewalling. In: 31st International Symposium on Reliable Distributed Systems, pp. 41\u201350 (2012)","DOI":"10.1109\/SRDS.2012.31"},{"issue":"4","key":"292_CR15","doi-asserted-by":"crossref","first-page":"1106","DOI":"10.1016\/j.comnet.2006.06.015","volume":"51","author":"MG Gouda","year":"2007","unstructured":"Gouda, M.G., Liu, A.X.: Structured firewall design. Comput. Netw. J. 51(4), 1106\u20131120 (2007)","journal-title":"Structured firewall design. Comput. Netw. J."},{"issue":"7","key":"292_CR16","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1145\/362686.362692","volume":"13","author":"B Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM. 13(7), 442\u2013426 (1970)","journal-title":"Commun. ACM."},{"key":"292_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9","volume-title":"Moving Target Defense","author":"S Jajodia","year":"2011","unstructured":"Jajodia, S., Ghost, A.K., Swarup, V., Wang, C., Sean Wang, X.: Moving Target Defense. Springer, New York (2011)"},{"key":"292_CR18","doi-asserted-by":"crossref","unstructured":"Fulp, E.W., Tarsa, S.J.: Trie-based policy representations for network firewalls. In: 10th IEEE Symposium on Computers and Communications, pp. 434\u2013441 (2005)","DOI":"10.1109\/ISCC.2005.149"},{"key":"292_CR19","doi-asserted-by":"crossref","unstructured":"Bose, P., Guo, H., Kranakis, E., Mahashwari, A., Morin, P., Morrison, J., Smid, M., Tang, Y.: On The False Positive Rate of Bloom Filters. Report, School of Computer Science. doi: 10.1016\/j.ipl.2008.05.018","DOI":"10.1016\/j.ipl.2008.05.018"},{"key":"292_CR20","unstructured":"EC-Council: The 5 phases every hacker must follow. EC-Council. http:\/\/www.clrgroup.com\/Site\/pdf\/EthicalHacking (2013). Accessed 1 Oct 2014"},{"key":"292_CR21","doi-asserted-by":"crossref","unstructured":"Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash Crowds and Denial of service attacks: characterization and implications for CDNs and websites. In: Proceeding of 11th World Wide Web conference, pp. 293\u2013304 (2002)","DOI":"10.1145\/511446.511485"},{"key":"292_CR22","unstructured":"Burstein, M.: Creating a simple Bloom filter. Max Burstein Blog. http:\/\/maxburstein.com\/blog\/creating-a-simple-bloom-filter\/ . Accessed 1 Aug 2014"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0292-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0292-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0292-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T22:52:31Z","timestamp":1553640751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0292-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,26]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["292"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0292-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,26]]}}}