{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:34:21Z","timestamp":1773117261506,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,24]],"date-time":"2007-10-24T00:00:00Z","timestamp":1193184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,24]]},"DOI":"10.1145\/1298306.1298327","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"135-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Issues and etiquette concerning use of shared measurement data"],"prefix":"10.1145","author":[{"given":"Mark","family":"Alllman","sequence":"first","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA and Lawrence Berkeley National Labs, Berkeley, CA"}]}],"member":"320","published-online":{"date-parts":[[2007,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD). http:\/\/crawdad.cs.dartmouth.edu\/.  Community Resource for Archiving Wireless Data At Dartmouth (CRAWDAD). http:\/\/crawdad.cs.dartmouth.edu\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Enterprise tracing project. http:\/\/www.icir.org\/linebreak{0}enterprise-tracing\/.  Enterprise tracing project. http:\/\/www.icir.org\/linebreak{0}enterprise-tracing\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Protected Repository for the Defense of Infrastructure against CyberThreats. http:\/\/www.predict.org\/.  Protected Repository for the Defense of Infrastructure against CyberThreats. http:\/\/www.predict.org\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Passive and Active Measurement Workshop","author":"Allman M.","year":"2002","unstructured":"M. Allman , E. Blanton , and W. Eddy . A Scalable System for Sharing Internet Measurements . In Passive and Active Measurement Workshop , Mar. 2002 . M. Allman, E. Blanton, and W. Eddy. A Scalable System for Sharing Internet Measurements. In Passive and Active Measurement Workshop, Mar. 2002."},{"key":"e_1_3_2_1_5_1","unstructured":"E. Blanton. tcpurify May 2004. http:\/\/irg.cs.ohiou.edu\/~eblanton\/tcpurify\/.  E. Blanton. tcpurify May 2004. http:\/\/irg.cs.ohiou.edu\/~eblanton\/tcpurify\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Apr.","author":"Blanton E.","year":"2007","unstructured":"E. Blanton . Personal communication , Apr. 2007 . E. Blanton. Personal communication, Apr. 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Coull S.","year":"2007","unstructured":"S. Coull , C. Wright , F. Monrose , M. Collins , and M. Reiter . Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces . In Proceedings of the Network and Distributed System Security Symposium , Feb. 2007 . S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2007."},{"key":"e_1_3_2_1_8_1","volume-title":"Apr.","author":"Heidemann J.","year":"2007","unstructured":"J. Heidemann . Personal communication , Apr. 2007 . J. Heidemann. Personal communication, Apr. 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129594"},{"key":"e_1_3_2_1_10_1","volume-title":"Aug.","author":"Minshall G.","year":"1997","unstructured":"G. Minshall . tcpdpriv , Aug. 1997 . http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html. G. Minshall. tcpdpriv, Aug. 1997. http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html."},{"key":"e_1_3_2_1_11_1","volume-title":"Apr.","author":"Monrose F.","year":"2007","unstructured":"F. Monrose and M. Reiter . Personal communication , Apr. 2007 . F. Monrose and M. Reiter. Personal communication, Apr. 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251088"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863994"},{"key":"e_1_3_2_1_15_1","unstructured":"V. Paxson. Internet Traffic Archive.http:\/\/ita.ee.lbl.gov\/.  V. Paxson. Internet Traffic Archive.http:\/\/ita.ee.lbl.gov\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028824"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096552"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the 10th IEEE International Conference on Network Protocols","author":"Xu J.","year":"2002","unstructured":"J. Xu , J. Fan , M. H. Ammar , and S. B. Moon . Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme . In Proc. of the 10th IEEE International Conference on Network Protocols , 2002 . J. Xu, J. Fan, M. H. Ammar, and S. B. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. In Proc. of the 10th IEEE International Conference on Network Protocols, 2002."}],"event":{"name":"IMC07: Internet Measurement Conference","location":"San Diego California USA","acronym":"IMC07","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 7th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298306.1298327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1298306.1298327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:08Z","timestamp":1750254968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298306.1298327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,24]]},"references-count":18,"alternative-id":["10.1145\/1298306.1298327","10.1145\/1298306"],"URL":"https:\/\/doi.org\/10.1145\/1298306.1298327","relation":{},"subject":[],"published":{"date-parts":[[2007,10,24]]},"assertion":[{"value":"2007-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}