{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:56Z","timestamp":1750307516228,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,28]],"date-time":"2009-06-28T00:00:00Z","timestamp":1246147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,28]]},"DOI":"10.1145\/1599272.1599283","type":"proceedings-article","created":{"date-parts":[[2009,9,8]],"date-time":"2009-09-08T12:53:09Z","timestamp":1252414389000},"page":"45-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards trusted intelligence information sharing"],"prefix":"10.1145","author":[{"given":"Joseph V.","family":"Treglia","sequence":"first","affiliation":[{"name":"Syracuse University Syracuse, NY"}]},{"given":"Joon S.","family":"Park","sequence":"additional","affiliation":[{"name":"Syracuse University Syracuse, NY"}]}],"member":"320","published-online":{"date-parts":[[2009,6,28]]},"reference":[{"volume-title":"Retrieved","year":"2008","author":"Bulman P.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Bureau of Justice Statistics Law Enforcement Statistics. (2007 August 8). Retrieved May 9 2008 from http:\/\/www.ojp.usdoj.gov\/bjs\/lawenf.htm.  Bureau of Justice Statistics Law Enforcement Statistics. (2007 August 8). Retrieved May 9 2008 from http:\/\/www.ojp.usdoj.gov\/bjs\/lawenf.htm."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Carter D. L. &amp;United States. (2004). Law Enforcement Intelligence a Guide for State Local and Tribal Law Enforcement Agencies. Washington D.C.: U.S. Dept. of Justice Office of Community Oriented Policing Services.  Carter D. L. &amp;United States. (2004). Law Enforcement Intelligence a Guide for State Local and Tribal Law Enforcement Agencies. Washington D.C.: U.S. Dept. of Justice Office of Community Oriented Policing Services.","DOI":"10.1037\/e310712005-001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133067"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1275511.1275515"},{"key":"e_1_3_2_1_6_1","unstructured":"Chau M. Atababhsh H. Zeng D. &amp;Chen H. (2002). Building an Infrastructure for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges. National Science Foundation. Retrieved February 4 2008 from http:\/\/dlist.sir.arizona.edu\/473\/01\/chau4.pdf.  Chau M. Atababhsh H. Zeng D. &amp;Chen H. (2002). Building an Infrastructure for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges. National Science Foundation. Retrieved February 4 2008 from http:\/\/dlist.sir.arizona.edu\/473\/01\/chau4.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/602421.602441"},{"volume-title":"Government Agency. Retrieved","year":"2008","author":"Clark J.","key":"e_1_3_2_1_8_1"},{"volume-title":"Proceedings of the 8th annual international conference on Digital government research: bridging disciplines&amp;domains (pp. 122--130)","year":"2007","author":"Cresswell A. M.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439303259889"},{"volume-title":"FY 2008, summary. (n.d.). Retrieved","year":"2009","author":"Federal Assistance from Department of Justice","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.03.001"},{"key":"e_1_3_2_1_13_1","unstructured":"Gao J. (2005). Information sharing trust in automation and cooperation for multi-operator multi-automation systems. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1079666781&Fmt=7&clientId=3739&RQT=309&VName=PQD.  Gao J. (2005). Information sharing trust in automation and cooperation for multi-operator multi-automation systems. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1079666781&Fmt=7&clientId=3739&RQT=309&VName=PQD."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsl.2007.03.003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/000312240607100208"},{"volume-title":"Retrieved","year":"2004","author":"White Paper","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1477370805056057"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248460.1248496"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/948542.948552"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2008.27752765"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(97)00022-0"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.12.006"},{"key":"e_1_3_2_1_24_1","unstructured":"Lee C. (2006). The role of trust in information sharing: A study of relationships of the interorganizational network of real property assessors in New York state. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1288656571&Fmt=7&clientId=3739&RQT=309&VName=PQD.  Lee C. (2006). The role of trust in information sharing: A study of relationships of the interorganizational network of real property assessors in New York state. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1288656571&Fmt=7&clientId=3739&RQT=309&VName=PQD."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2008.4565011"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248460.1248485"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2008.01.001"},{"key":"e_1_3_2_1_29_1","unstructured":"Lieberman J. (2007). Confronting the Terrorist Threat to the Homeland: Six Years After 9\/11. 342 DIRKSEN SENATE OFFICE BUILDING WASHINGTON D.C.: Federal News Service. Retrieved May 8 2008 from http:\/\/www.fas.org\/irp\/congress\/2007_hr\/091007transcript.pdf.  Lieberman J. (2007). Confronting the Terrorist Threat to the Homeland: Six Years After 9\/11. 342 DIRKSEN SENATE OFFICE BUILDING WASHINGTON D.C.: Federal News Service. Retrieved May 8 2008 from http:\/\/www.fas.org\/irp\/congress\/2007_hr\/091007transcript.pdf."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248460.1248468"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/1043986207301364"},{"key":"e_1_3_2_1_32_1","unstructured":"Mckay J. (2008). Statement of John McKay Former United States Attorney For the Western District of Washington Before the Subcommittee on Intelligence Information Sharing And Terrorism Risk Assessment Committee on Homeland Security United States House of Representatives (Washington D.C. 2008) Retrieved October 18 2008 from http:\/\/webdev.maxwell.syr.edu\/insct\/Research\/IS%20Page\/McKay%20Testimony.pdf.  Mckay J. (2008). Statement of John McKay Former United States Attorney For the Western District of Washington Before the Subcommittee on Intelligence Information Sharing And Terrorism Risk Assessment Committee on Homeland Security United States House of Representatives (Washington D.C. 2008) Retrieved October 18 2008 from http:\/\/webdev.maxwell.syr.edu\/insct\/Research\/IS%20Page\/McKay%20Testimony.pdf."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"e_1_3_2_1_34_1","unstructured":"Niu J. (2007). Circles of trust: A comparison of the size and composition of trust circles in Canada and in China. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1276413271&Fmt=7&clientId=3739&RQT=309&VName=PQD.  Niu J. (2007). Circles of trust: A comparison of the size and composition of trust circles in Canada and in China. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1276413271&Fmt=7&clientId=3739&RQT=309&VName=PQD."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-006-0278-6"},{"key":"e_1_3_2_1_36_1","article-title":"Component survivability for mission-critical distributed systems","author":"Park J.","year":"2009","journal-title":"Journal of Automatic and Trusted Computing (JoATC). In press."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Park J. An G. and Chandra D. (2007). Trusted P2P computing environments with role-based access control (RBAC). IET (The Institution of Engineering and Technology formerly IEE) Information Security 1(1):27--35.  Park J. An G. and Chandra D. (2007). Trusted P2P computing environments with role-based access control (RBAC). IET (The Institution of Engineering and Technology formerly IEE) Information Security 1(1):27--35.","DOI":"10.1049\/iet-ifs:20060084"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/647184.719654"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/383775.383777"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/COLCOM.2006.361878"},{"volume-title":"Proceedings of the 9th European Symposium on Research in Computer Security, September 13--15","year":"2004","author":"Ray","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180946"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/274644.274711"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2979\/esj.2003.2.2.25"},{"key":"e_1_3_2_1_45_1","unstructured":"Schooley B. L. (2007). Inter-organizational systems analysis to improve time-critical public services: The case of mobile emergency medical services. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1390309161&Fmt=7&clientId=3739&RQT=309&VName=PQD.  Schooley B. L. (2007). Inter-organizational systems analysis to improve time-critical public services: The case of mobile emergency medical services. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1390309161&Fmt=7&clientId=3739&RQT=309&VName=PQD."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2007.24348410"},{"key":"e_1_3_2_1_47_1","unstructured":"Scott E. D. (2006). Factors influencing user-level success in police information sharing: An examination of Florida's FINDER system. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1251886251&Fmt=7&clientId=3739&RQT=309&VName=PQD.  Scott E. D. (2006). Factors influencing user-level success in police information sharing: An examination of Florida's FINDER system. Retrieved from http:\/\/proquest.umi.com\/pqdweb?did=1251886251&Fmt=7&clientId=3739&RQT=309&VName=PQD."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89965-5_20"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1108\/09534819710171095"},{"key":"e_1_3_2_1_50_1","unstructured":"Stacey R. (1996). Complexity and Creativity in Organizations (1st ed. p. 312). Berrett-Koehler Publishers.  Stacey R. (1996). Complexity and Creativity in Organizations (1st ed. p. 312). Berrett-Koehler Publishers."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024-6301(85)90064-0"},{"key":"e_1_3_2_1_52_1","unstructured":"United States. (2007b). Building the Information Sharing Environment: Addressing the Challenges of Implementation: Hearing Before the Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment of the Committee on Homeland Security U.S. House of Representatives One Hundred Ninth Congress Second Session May 10 2006 (p. 27). Washington: U.S. G.P.O.  United States. (2007b). Building the Information Sharing Environment: Addressing the Challenges of Implementation: Hearing Before the Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment of the Committee on Homeland Security U.S. House of Representatives One Hundred Ninth Congress Second Session May 10 2006 (p. 27). Washington: U.S. G.P.O."},{"key":"e_1_3_2_1_53_1","unstructured":"United States. (2007c). Federal Support for Homeland Security Information Sharing: Role of the Information Sharing Program Manager: Hearing Before the Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment of the Committee on Homeland Security House of Representatives One Hundred Ninth Congress First Session November 8 2005 (p. 58). Washington: U.S. G.P.O. Retrieved from http:\/\/www.gpoaccess.gov\/congress\/index.html.  United States. (2007c). Federal Support for Homeland Security Information Sharing: Role of the Information Sharing Program Manager: Hearing Before the Subcommittee on Intelligence Information Sharing and Terrorism Risk Assessment of the Committee on Homeland Security House of Representatives One Hundred Ninth Congress First Session November 8 2005 (p. 58). Washington: U.S. G.P.O. Retrieved from http:\/\/www.gpoaccess.gov\/congress\/index.html."},{"key":"e_1_3_2_1_54_1","unstructured":"U.S. Dept. of Justice Bureau of Justice Statistics (2006). Law Enforcement Management and Administrative Statistics (LEMAS): 2003 Sample Survey of Law Enforcement Agencies {Computer file}. ICPSR04411-v1. Ann Arbor MI: Inter-university Consortium for Political and Social Research {producer and distributor} 2006.  U.S. Dept. of Justice Bureau of Justice Statistics (2006). Law Enforcement Management and Administrative Statistics (LEMAS): 2003 Sample Survey of Law Enforcement Agencies {Computer file}. ICPSR04411-v1. Ann Arbor MI: Inter-university Consortium for Political and Social Research {producer and distributor} 2006."},{"volume-title":"Proceedings of iConference","year":"2009","author":"Treglia J.","key":"e_1_3_2_1_55_1"},{"volume-title":"Retrieved","year":"2007","author":"Whitehouse","key":"e_1_3_2_1_56_1"}],"event":{"name":"KDD09: The 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Paris France","acronym":"KDD09"},"container-title":["Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1599272.1599283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:09Z","timestamp":1750249089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1599272.1599283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,28]]},"references-count":56,"alternative-id":["10.1145\/1599272.1599283","10.1145\/1599272"],"URL":"https:\/\/doi.org\/10.1145\/1599272.1599283","relation":{},"subject":[],"published":{"date-parts":[[2009,6,28]]},"assertion":[{"value":"2009-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}