{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:16:35Z","timestamp":1729653395732,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icin.2017.7899393","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T16:32:09Z","timestamp":1492446729000},"page":"79-86","source":"Crossref","is-referenced-by-count":3,"title":["Providing for privacy in a network infrastructure protection context"],"prefix":"10.1109","author":[{"given":"Ian","family":"Oliver","sequence":"first","affiliation":[]},{"given":"Silke","family":"Holtmanns","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SSDM.1996.505910"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049516"},{"key":"ref31","article-title":"Detach me not - DoS attacks against 4g cellular users from your desk","author":"holtmans","year":"2016","journal-title":"Blackhat Europe 2016"},{"key":"ref30","first-page":"10","article-title":"Privacy-preserving alert correlation: a concept hierarchy based approach","author":"xu","year":"2005","journal-title":"Computer Security Applications Conference 21st Annual"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/62139.62141"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/62138.62141"},{"journal-title":"A Pseudonymous Communications Infrastructure for the Internet","year":"2000","author":"goldberg","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2011.5767589"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0346-0078-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref16","article-title":"How unique is your web browser?","author":"eckersley","year":"2009","journal-title":"Tech Rep"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"journal-title":"Risk Taxonomy","year":"2009","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672310"},{"journal-title":"Code and other Laws of Cyberspace","year":"1999","author":"lessig","key":"ref4"},{"key":"ref27","article-title":"Efficient algorithms for masking and finding quasi-identifiers","author":"motwani","year":"2007","journal-title":"Proc 28th International Conference on Very Large Data Bases (VLDB)"},{"key":"ref3","article-title":"Code is law: On liberty in cyberspace","author":"lessig","year":"2000","journal-title":"Harvard Magazine"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/actrade\/9780198725947.001.0001"},{"key":"ref29","article-title":"The 15 worst data security breaches of the 21st century","author":"armerding","year":"2012","journal-title":"CSO Security and Risk"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2307\/1879431"},{"journal-title":"Ologs a categorical framework for knowledge representation","year":"2011","author":"spivak","key":"ref8"},{"key":"ref7","first-page":"155","article-title":"Will security enhance trust online, or supplant it?","author":"nissenbaum","year":"2004","journal-title":"Trust and Distrust Within Organizations Emerging Perspectives Enduring Questions"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.1"},{"journal-title":"Privacy Engineering A Data Flow and Ontological Approach","year":"2014","author":"oliver","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2307\/3481326"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2008.1"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s00766-003-0183-z","article-title":"A requirements taxonomy for reducing web site privacy vulnerabilities","volume":"9","author":"ant\u00f3n","year":"2004","journal-title":"Requirements Engineering"},{"key":"ref24","first-page":"24","article-title":"?-diversity: Privacy beyond ?-anonymity","author":"machanavajjhala","year":"2006","journal-title":"2013 IEEE 29th International Conference on Data Engineering (ICDE)"},{"key":"ref23","first-page":"217","article-title":"Data privacy through optimal ?-anonymization","author":"bayardo","year":"2005","journal-title":"In ICDE"},{"journal-title":"A taxonomy model and method for secure network log anonymization","year":"2008","author":"king","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"}],"event":{"name":"2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)","start":{"date-parts":[[2017,3,7]]},"location":"Paris","end":{"date-parts":[[2017,3,9]]}},"container-title":["2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7897354\/7899236\/07899393.pdf?arnumber=7899393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T00:09:31Z","timestamp":1569024571000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7899393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icin.2017.7899393","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}