{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:03Z","timestamp":1750220883316,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3340509","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Automated Cyber Threat Sensing and Responding"],"prefix":"10.1145","author":[{"given":"Peter","family":"Amthor","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau, Ilmenau, Germany"}]},{"given":"Daniel","family":"Fischer","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau, Ilmenau, Germany"}]},{"given":"Winfried E.","family":"K\u00fchnhauser","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau, Ilmenau, Germany"}]},{"given":"Dirk","family":"Stelzer","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Ilmenau, Ilmenau, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v10.i1.pp371-379"},{"volume-title":"Aspect-oriented Security Engineering","author":"Amthor Peter","key":"e_1_3_2_1_2_1","unstructured":"Peter Amthor . 2019. Aspect-oriented Security Engineering . Cuvillier Verlag , G\u00f6ttingen, Germany . 260 pages. ISBN 978-3-7369-9980-0. Peter Amthor. 2019. Aspect-oriented Security Engineering. Cuvillier Verlag, G\u00f6ttingen, Germany. 260 pages. ISBN 978-3-7369-9980-0."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808128.2808131"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2011.25"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501979"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808128.2808133"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29963-6_11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914650"},{"key":"e_1_3_2_1_12_1","volume-title":"2013 5th International Conference on Cyber Conflict (CYCON","author":"Dandurand Luc","year":"2013","unstructured":"Luc Dandurand and Oscar Serrano . 2013 . Towards improved cyber security information sharing . In 2013 5th International Conference on Cyber Conflict (CYCON 2013). IEEE, 1--16. Luc Dandurand and Oscar Serrano. 2013. Towards improved cyber security information sharing. In 2013 5th International Conference on Cyber Conflict (CYCON 2013). IEEE, 1--16."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3208947"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.012"},{"key":"e_1_3_2_1_15_1","unstructured":"OASIS Cyber Threat Intelligence (CTI) Technical Committee (Ed.). 2017. STIX\u2122 Version 2.0. Part 2: STIX Objects. Committee Specification 01. Retrieved April 1 2019 from http:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part2-stix-objects\/stix-v2.0-cs01-part2-stix-objects.html  OASIS Cyber Threat Intelligence (CTI) Technical Committee (Ed.). 2017. STIX\u2122 Version 2.0. Part 2: STIX Objects. Committee Specification 01. Retrieved April 1 2019 from http:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part2-stix-objects\/stix-v2.0-cs01-part2-stix-objects.html"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875496"},{"volume-title":"Role-Based Access Control","author":"Ferraiolo David","key":"e_1_3_2_1_18_1","unstructured":"David Ferraiolo , D. Richard Kuhn , and Ramaswamy Chandramouli . 2007. Role-Based Access Control . Artech House . 381 pages. Second Edition, ISBN 978-1-59693-113-8. David Ferraiolo, D. Richard Kuhn, and Ramaswamy Chandramouli. 2007. Role-Based Access Control. Artech House. 381 pages. Second Edition, ISBN 978-1-59693-113-8."},{"key":"e_1_3_2_1_19_1","volume-title":"Policy Machine: Features, Architecture, and Specification. Technical Report NIST Interagency\/Internal Report (NISTIR) -- 7987 Rev 1","author":"Ferraiolo David F.","year":"2015","unstructured":"David F. Ferraiolo , Serban I. Gavrila , and Wayne Jansen . 2015 . Policy Machine: Features, Architecture, and Specification. Technical Report NIST Interagency\/Internal Report (NISTIR) -- 7987 Rev 1 . National Institute of Standards and Technology , Palo Alto, CA 94301. David F. Ferraiolo, Serban I. Gavrila, and Wayne Jansen. 2015. Policy Machine: Features, Architecture, and Specification. Technical Report NIST Interagency\/Internal Report (NISTIR) -- 7987 Rev 1. National Institute of Standards and Technology, Palo Alto, CA 94301."},{"volume-title":"Proc. IEEE Symposium on Security and Privacy. IEEE, 11--20","author":"Joseph","key":"e_1_3_2_1_21_1","unstructured":"Joseph A. Goguen and Jos\u00e9 Meseguer. 1982. Security Policies and Security Models . In Proc. IEEE Symposium on Security and Privacy. IEEE, 11--20 . Joseph A. Goguen and Jos\u00e9 Meseguer. 1982. Security Policies and Security Models. In Proc. IEEE Symposium on Security and Privacy. IEEE, 11--20."},{"volume-title":"Sense and Respond - How Successful Organizations Listen to Customers and Create New Products Continuously","author":"Gothelf Jeff","key":"e_1_3_2_1_22_1","unstructured":"Jeff Gothelf and Josh Seiden . 2017. Sense and Respond - How Successful Organizations Listen to Customers and Create New Products Continuously . Harvard Business Press, Boston, MA , USA. Jeff Gothelf and Josh Seiden. 2017. Sense and Respond - How Successful Organizations Listen to Customers and Create New Products Continuously. Harvard Business Press, Boston, MA, USA."},{"key":"e_1_3_2_1_23_1","volume-title":"Johansson","author":"Grimes Roger A.","year":"2007","unstructured":"Roger A. Grimes and Jesper M . Johansson . 2007 . Windows Vista Security: Securing Vista Against Malicious Attacks. John Wiley & Sons , Inc., New York, NY, USA. Roger A. Grimes and Jesper M. Johansson. 2007. Windows Vista Security: Securing Vista Against Malicious Attacks. John Wiley & Sons, Inc., New York, NY, USA."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232797"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875495"},{"key":"e_1_3_2_1_26_1","first-page":"2016","article-title":"ISO\/IEC 27035:2016: Information technology -- Security techniques -- Information security incident management","volume":"27035","author":"International Organization for Standardization.","year":"2016","unstructured":"International Organization for Standardization. 2016 . ISO\/IEC 27035:2016: Information technology -- Security techniques -- Information security incident management . ISO 27035 : 2016 . International Organization for Standardization (ISO), Geneva, Switzerland. International Organization for Standardization. 2016. ISO\/IEC 27035:2016: Information technology -- Security techniques -- Information security incident management. ISO 27035:2016. International Organization for Standardization (ISO), Geneva, Switzerland.","journal-title":"ISO"},{"key":"e_1_3_2_1_27_1","volume-title":"The Long-Term Impact of User Account Control. https:\/\/technet.microsoft.com\/en-us\/library\/2007.09.securitywatch.aspx {Online","author":"Johansson Jesper M.","year":"2017","unstructured":"Jesper M. Johansson . 2008. The Long-Term Impact of User Account Control. https:\/\/technet.microsoft.com\/en-us\/library\/2007.09.securitywatch.aspx {Online ; accessed 2017 -11-10}. Jesper M. Johansson. 2008. The Long-Term Impact of User Account Control. https:\/\/technet.microsoft.com\/en-us\/library\/2007.09.securitywatch.aspx {Online; accessed 2017-11-10}."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.99"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/974104.974105"},{"key":"e_1_3_2_1_31_1","volume-title":"Intelligence Defined and its Impact on Cyber Threat Intelligence. Retrieved","author":"Lee Robert M.","year":"2019","unstructured":"Robert M. Lee . 2016. Intelligence Defined and its Impact on Cyber Threat Intelligence. Retrieved March 2, 2019 from http:\/\/robertmlee.org\/intelligencedefined-and-its-impact-on-cyber-threat-intelligence Robert M. Lee. 2016. Intelligence Defined and its Impact on Cyber Threat Intelligence. Retrieved March 2, 2019 from http:\/\/robertmlee.org\/intelligencedefined-and-its-impact-on-cyber-threat-intelligence"},{"volume-title":"2001 USENIX Annual Technical Conference, Clem Cole (Ed.). 29--42","author":"Peter","key":"e_1_3_2_1_32_1","unstructured":"Peter A. Loscocco and Stephen D. Smalley. 2001. Integrating Flexible Support for Security Policies into the Linux Operating System . In 2001 USENIX Annual Technical Conference, Clem Cole (Ed.). 29--42 . Peter A. Loscocco and Stephen D. Smalley. 2001. Integrating Flexible Support for Security Policies into the Linux Operating System. In 2001 USENIX Annual Technical Conference, Clem Cole (Ed.). 29--42."},{"key":"e_1_3_2_1_33_1","volume-title":"Retrieved","author":"McMillan Rob","year":"2013","unstructured":"Rob McMillan . 2013 . Definition: Threat Intelligence . Retrieved March 29, 2019 from https:\/\/www.gartner.com\/doc\/2487216\/definition-threat-intelligence Rob McMillan. 2013. Definition: Threat Intelligence. Retrieved March 29, 2019 from https:\/\/www.gartner.com\/doc\/2487216\/definition-threat-intelligence"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.009"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132465.3132468"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.48"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755719"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752962"},{"key":"e_1_3_2_1_42_1","unstructured":"John Rushby. 1992. Noninterference Transitivity and Channel-Control Security Policies. Technical Report. http:\/\/www.csl.sri.com\/papers\/csl-92-2\/  John Rushby. 1992. Noninterference Transitivity and Channel-Control Security Policies. Technical Report. http:\/\/www.csl.sri.com\/papers\/csl-92-2\/"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 13th International Conference on Wirtschaftsinformatik (WI","author":"Sauerwein Clemens","year":"2017","unstructured":"Clemens Sauerwein , Christian Sillaber , Andrea Mussmann , and Ruth Breu . 2017 . Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives . In Proceedings of the 13th International Conference on Wirtschaftsinformatik (WI 2017). 837--851. Clemens Sauerwein, Christian Sillaber, Andrea Mussmann, and Ruth Breu. 2017. Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives. In Proceedings of the 13th International Conference on Wirtschaftsinformatik (WI 2017). 837--851."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663876.2663882"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985754"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2752952.2752966"},{"key":"e_1_3_2_1_50_1","first-page":"2","article-title":"Context-based Access Control Systems for Mobile Devices","volume":"12","author":"Shebaro Bilal","year":"2014","unstructured":"Bilal Shebaro , Oyindamola Oluwatimi , and Elisa Bertino . 2014 . Context-based Access Control Systems for Mobile Devices . IEEE Transactions on Dependable and Secure Computing 12 , 2 (April 2014), 150--163. Bilal Shebaro, Oyindamola Oluwatimi, and Elisa Bertino. 2014. Context-based Access Control Systems for Mobile Devices. IEEE Transactions on Dependable and Secure Computing 12, 2 (April 2014), 150--163.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.04.003"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.001"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31970-2_18"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994539.2994542"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880034"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990059"},{"key":"e_1_3_2_1_58_1","volume-title":"Securing Distributed Systems with Information Flow Control. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association","author":"Zeldovich Nickolai","year":"2008","unstructured":"Nickolai Zeldovich , Silas Boyd-Wickizer , and David Mazi\u00e8res . 2008 . Securing Distributed Systems with Information Flow Control. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association , Berkeley, CA, USA, 293--308. Nickolai Zeldovich, Silas Boyd-Wickizer, and David Mazi\u00e8res. 2008. Securing Distributed Systems with Information Flow Control. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, Berkeley, CA, USA, 293--308."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004)","author":"Zhang Guangsen","year":"2004","unstructured":"Guangsen Zhang and Manish Parashar . 2004 . Context-aware Dynamic Access Control for Pervasive Applications . In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004) , 2004 Western MultiConference (WMC). San Diego, CA, USA. TASSL\/Papers\/automate-sesame-cnds-04.pdf Guangsen Zhang and Manish Parashar. 2004. Context-aware Dynamic Access Control for Pervasive Applications. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), 2004 Western MultiConference (WMC). San Diego, CA, USA. TASSL\/Papers\/automate-sesame-cnds-04.pdf"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9782-4"},{"key":"e_1_3_2_1_61_1","volume-title":"Li","author":"Zhang Yongsheng S.","year":"2014","unstructured":"Yongsheng S. Zhang , Mingfeng F. Wu , Lei Wu , and Yuanyuan Y . Li . 2014 . Attribute-Based Access Control Security Model in Service-Oriented Computing. Springer New York , New York, NY, 1473--1479. Yongsheng S. Zhang, Mingfeng F. Wu, Lei Wu, and Yuanyuan Y. Li. 2014. Attribute-Based Access Control Security Model in Service-Oriented Computing. Springer New York, New York, NY, 1473--1479."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2012.6459892"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","acronym":"ARES '19","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3340509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:18Z","timestamp":1750203858000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3340509"}},"subtitle":["Integrating Threat Intelligence into Security-Policy-Controlled Systems"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":54,"alternative-id":["10.1145\/3339252.3340509","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3340509","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}