{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:11:05Z","timestamp":1758845465688},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1179601.1179620","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"99-108","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A privacy-preserving interdomain audit framework"],"prefix":"10.1145","author":[{"given":"Adam J.","family":"Lee","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Parisa","family":"Tabriz","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029204"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the USENIX Security Symposium","author":"Bethencourt J.","year":"2005","unstructured":"J. Bethencourt , J. Franklin , and M. Vernon . Mapping internet sensors with probe response attacks . In Proceedings of the USENIX Security Symposium , August 2005 . J. Bethencourt, J. Franklin, and M. Vernon. Mapping internet sensors with probe response attacks. In Proceedings of the USENIX Security Symposium, August 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502018"},{"key":"e_1_3_2_1_7_1","unstructured":"California Senate Bill SB 1386 Sept. 2002. http:\/\/info.sen.ca.gov\/pub\/01-02\/bill\/sen\/sb 1351-1400\/ sb 1386 bill 20020926 chaptered.html.  California Senate Bill SB 1386 Sept. 2002. http:\/\/info.sen.ca.gov\/pub\/01-02\/bill\/sen\/sb 1351-1400\/ sb 1386 bill 20020926 chaptered.html."},{"key":"e_1_3_2_1_8_1","first-page":"w3","article-title":"Intrusion detection message exchange format","author":"Debar H.","year":"2005","unstructured":"H. Debar , D. Curry , and B. Feinstein . Intrusion detection message exchange format . IETF Internet-Draft , Jan. 2005 . hhttp:\/\/ww w3 .ietf.org\/proceedings\/05mar\/ IDs\/draft-ietf-idwg-idmef-xml-14.txti. H. Debar, D. Curry, and B. Feinstein. Intrusion detection message exchange format. IETF Internet-Draft, Jan. 2005. hhttp:\/\/www3.ietf.org\/proceedings\/05mar\/ IDs\/draft-ietf-idwg-idmef-xml-14.txti.","journal-title":"IETF Internet-Draft"},{"key":"e_1_3_2_1_9_1","volume-title":"Web site","author":"DeepSight","year":"2006","unstructured":"DeepSight analyzer. Web site , 2006 . hhttp:\/\/analyzer.symantec.com\/i. DeepSight analyzer. Web site, 2006. hhttp:\/\/analyzer.symantec.com\/i."},{"key":"e_1_3_2_1_10_1","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Oct. 1995. Available at http: \/\/ec.europa.eu\/justice home\/fsj\/privacy\/law\/index en.htm.  Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data Oct. 1995. Available at http: \/\/ec.europa.eu\/justice home\/fsj\/privacy\/law\/index en.htm."},{"volume-title":"Web Page","year":"2006","key":"e_1_3_2_1_11_1","unstructured":"DShield-distributed intrustion detection system . Web Page , 2006 . hhttp:\/\/www.dshield.orgi. DShield-distributed intrustion detection system. Web Page, 2006. hhttp:\/\/www.dshield.orgi."},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/11587552_2","volume-title":"Proceedings of Middleware","author":"Emekci F.","year":"2005","unstructured":"F. Emekci , D. Agrawal , and A. E. Abbadi . ABACUS: A distributed middleware for privacy preserving data sharing across private data warehouses . In Proceedings of Middleware 2005 , volume 3790 of Lecture Notes in Computer Science , pages 21 -- 41 . Springer-Verlag , 2005. F. Emekci, D. Agrawal, and A. E. Abbadi. ABACUS: A distributed middleware for privacy preserving data sharing across private data warehouses. In Proceedings of Middleware 2005, volume 3790 of Lecture Notes in Computer Science, pages 21--41. Springer-Verlag, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_15_1","volume-title":"Version 1.4","author":"Goldreich O.","year":"2002","unstructured":"O. Goldreich . Secure multi-party computation. Working draft , Version 1.4 , Oct. 2002 . hhttp:\/\/www.wisdom.weizmann.ac.il\/~odedg\/pp.htmli. O. Goldreich. Secure multi-party computation. Working draft, Version 1.4, Oct. 2002. hhttp:\/\/www.wisdom.weizmann.ac.il\/~odedg\/pp.htmli."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0173-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251120"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_3_2_1_19_1","volume-title":"HMAC: Keyed-hashing for message authentication. IETF RFC","author":"Krawczyk H.","year":"1997","unstructured":"H. Krawczyk , M. Bellare , and R. Canetti . HMAC: Keyed-hashing for message authentication. IETF RFC 2104, Feb. 1997 . hhttp:\/\/www.ietf.org\/rfc\/rfc2104.txti. H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. IETF RFC 2104, Feb. 1997. hhttp:\/\/www.ietf.org\/rfc\/rfc2104.txti."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Lincoln P.","year":"2004","unstructured":"P. Lincoln , P. Porras , and V. Shmatikov . Privacy-preserving sharing and correlation of security alerts . In Proceedings of the 13th USENIX Security Symposium , Aug. 2004 . P. Lincoln, P. Porras, and V. Shmatikov. Privacy-preserving sharing and correlation of security alerts. In Proceedings of the 13th USENIX Security Symposium, Aug. 2004."},{"key":"e_1_3_2_1_21_1","volume-title":"May","author":"IntruShield Security Manager McAfee","year":"2006","unstructured":"McAfee IntruShield Security Manager . Web site , May 2006 . hhttp: \/\/www.mcafee.com\/us\/enterprise\/products\/network intrusion prevention\/intrushield security management system.htmli. McAfee IntruShield Security Manager. Web site, May 2006. hhttp: \/\/www.mcafee.com\/us\/enterprise\/products\/network intrusion prevention\/intrushield security management system.htmli."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/526950.830433"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology-EUROCRYPT '99","author":"Paillier P.","year":"1999","unstructured":"P. Paillier . Public-key cryptosystems based on composite degree residuosity classes . In J. Stern, editor, Advances in Cryptology-EUROCRYPT '99 , volume 1592 of Lecture Notes in Computer Science , pages 223 -- 238 . Springer-Verlag , 1999 . P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Advances in Cryptology-EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 223--238. Springer-Verlag, 1999."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863994"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"volume-title":"May","year":"2006","key":"e_1_3_2_1_27_1","unstructured":"Planetlab. Web site , May 2006 . hhttp:\/\/www.planet-lab.org\/php\/pr\/i. Planetlab. Web site, May 2006. hhttp:\/\/www.planet-lab.org\/php\/pr\/i."},{"key":"e_1_3_2_1_28_1","volume-title":"COMPUTERWORLD Security","author":"Roberts P.","year":"2004","unstructured":"P. Roberts . Update : Hackers breach supercomputer centers . COMPUTERWORLD Security , Apr. 2004 . hhttp: \/\/www.teragrid.org\/news\/apps\/0404\/computerworld2.htmli. P. Roberts. Update: Hackers breach supercomputer centers. COMPUTERWORLD Security, Apr. 2004. hhttp: \/\/www.teragrid.org\/news\/apps\/0404\/computerworld2.htmli."},{"key":"e_1_3_2_1_29_1","volume-title":"May","author":"Roesch M.","year":"2006","unstructured":"M. Roesch . Snort , intrusion detection system. Web site , May 2006 . hhttp:\/\/www.snort.orgi. M. Roesch. Snort, intrusion detection system. Web site, May 2006. hhttp:\/\/www.snort.orgi."},{"key":"e_1_3_2_1_30_1","volume-title":"20th USENIX Large Installation System Administration Conference","author":"Slagell A.","year":"2006","unstructured":"A. Slagell , K. Lakkaraju , and K. Luo . FLAIM: A multi-level anonymization framework for computer and network logs . In 20th USENIX Large Installation System Administration Conference , Dec. 2006 . A. Slagell, K. Lakkaraju, and K. Luo. FLAIM: A multi-level anonymization framework for computer and network logs. In 20th USENIX Large Installation System Administration Conference, Dec. 2006."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. 14th NIST-NCSC National Computer Security Conference","author":"Snapp S. R.","year":"1991","unstructured":"S. R. Snapp , J. Brentano , G. V. Dias , T. L. Goan , L. T. Heberlein , C.-L. Ho , K. N. Levitt , B. Mukherjee , S. E. Smaha , T. Grance , D. M. Teal , and D. Mansur . DIDS (distributed intrusion detection system) -- motivation, architecture, and an early prototype . In Proc. 14th NIST-NCSC National Computer Security Conference , 1991 . S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein, C.-L. Ho, K. N. Levitt, B. Mukherjee, S. E. Smaha, T. Grance, D. M. Teal, and D. Mansur. DIDS (distributed intrusion detection system) -- motivation, architecture, and an early prototype. In Proc. 14th NIST-NCSC National Computer Security Conference, 1991."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"e_1_3_2_1_33_1","volume-title":"May","author":"Tcpdump","year":"2006","unstructured":"Tcpdump public repository. Web site , May 2006 . hhttp:\/\/www.tcpdump.orgi. Tcpdump public repository. Web site, May 2006. hhttp:\/\/www.tcpdump.orgi."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC'03)","author":"Wu Y.-S.","year":"2003","unstructured":"Y.-S. Wu , B. Foo , Y. Mei , and S. Bagchi . Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS . In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC'03) , Dec. 2003 . Y.-S. Wu, B. Foo, Y. Mei, and S. Bagchi. Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC'03), Dec. 2003."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the The 11th Annual Network and Distributed System Security Symposium (NDSS'04)","author":"Yegneswaran V.","year":"2004","unstructured":"V. Yegneswaran , P. Barford , and S. Jha . Global intrusion detection in the DOMINO overlay system . In Proceedings of the The 11th Annual Network and Distributed System Security Symposium (NDSS'04) , 2004 . V. Yegneswaran, P. Barford, and S. Jha. Global intrusion detection in the DOMINO overlay system. In Proceedings of the The 11th Annual Network and Distributed System Security Symposium (NDSS'04), 2004."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4253","volume-title":"The secure shell (SSH) transport layer protocol. IETF RFC","author":"Ylonen T.","year":"2006","unstructured":"T. Ylonen and C. Lonvick . The secure shell (SSH) transport layer protocol. IETF RFC 4253, Jan. 2006 . hhttp:\/\/www.ietf.org\/rfc\/rfc4253.txti. T. Ylonen and C. Lonvick. The secure shell (SSH) transport layer protocol. IETF RFC 4253, Jan. 2006. hhttp:\/\/www.ietf.org\/rfc\/rfc4253.txti."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 9th Annual USENIX Security Symposium","author":"Zhang Y.","year":"2000","unstructured":"Y. Zhang and V. Paxson . Detecting stepping stones . In Proceedings of the 9th Annual USENIX Security Symposium , Aug. 2000 . Y. Zhang and V. Paxson. Detecting stepping stones. In Proceedings of the 9th Annual USENIX Security Symposium, Aug. 2000."}],"event":{"name":"CCS06: 13th ACM Conference on Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS06"},"container-title":["Proceedings of the 5th ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1179601.1179620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T07:20:16Z","timestamp":1672989616000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1179601.1179620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":39,"alternative-id":["10.1145\/1179601.1179620","10.1145\/1179601"],"URL":"https:\/\/doi.org\/10.1145\/1179601.1179620","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}