{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:56:53Z","timestamp":1729645013025,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/crisis.2013.6766356","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T19:00:43Z","timestamp":1395342043000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Controlled information sharing for unspecified emergencies"],"prefix":"10.1109","author":[{"given":"Barbara","family":"Carminati","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Guglielmi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266842"},{"year":"2013","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.17"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.3115\/981732.981751"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0106-1"},{"key":"15","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1007\/s00778-007-0051-4","article-title":"Detecting anomalous access patterns in relational databases","volume":"17","author":"kamra","year":"2008","journal-title":"The VLDB Journal"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.12"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1866886.1866890"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2008.04.001"},{"year":"0","key":"12"},{"year":"0","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.07.001"},{"key":"20","article-title":"Distributional measures of semantic distance:A survey","author":"mohammad","year":"2012","journal-title":"CoRR abs\/1203 1858"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29038-1_8"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.69"},{"key":"6","first-page":"237","article-title":"Attributebased encryption with break-glass","author":"brucker","year":"2010","journal-title":"Workshop in Information Security Theory and Practice (WISTP) Number 6033 in Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1096601.1096629"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2009.5429045"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.08.028"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1866855.1866859"}],"event":{"name":"2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)","start":{"date-parts":[[2013,10,23]]},"location":"La Rochelle, France","end":{"date-parts":[[2013,10,25]]}},"container-title":["2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6749561\/6766339\/06766356.pdf?arnumber=6766356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:00:36Z","timestamp":1498125636000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6766356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/crisis.2013.6766356","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}