{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:53:51Z","timestamp":1767084831917,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670909","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0183-3613","authenticated-orcid":false,"given":"Alexandr","family":"Silonosov","sequence":"first","affiliation":[{"name":"Blekinge Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0518-6532","authenticated-orcid":false,"given":"Lawrence","family":"Henesey","sequence":"additional","affiliation":[{"name":"Blekinge Institute of Technology, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ACM CCS","author":"Agrawal Shashank","year":"2017","unstructured":"Shashank Agrawal and Melissa Chase. 2017. FAME: Fast Attribute-based Message Encryption. https:\/\/eprint.iacr.org\/2017\/807 Publication info: Published elsewhere. ACM CCS 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179290"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"C. Bird T. Menzies and T. Zimmermann. 2015. The Art and Science of Analyzing Software Data. https:\/\/doi.org\/10.1016\/C2012-0-07289-4 Pages: 648.","DOI":"10.1016\/C2012-0-07289-4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.09.006"},{"key":"e_1_3_2_1_6_1","volume-title":"A Formal Security Analysis of the Signal Messaging Protocol. https:\/\/eprint.iacr.org\/2016\/1013 Publication info: Published elsewhere. Major revision","author":"Cohn-Gordon Katriel","year":"2017","unstructured":"Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, and Douglas Stebila. 2016. A Formal Security Analysis of the Signal Messaging Protocol. https:\/\/eprint.iacr.org\/2016\/1013 Publication info: Published elsewhere. Major revision. IEEE EuroS&P 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"Advances in Neural Information Processing Systems, Vol.\u00a030. Curran Associates","author":"Ding Bolin","year":"2017","unstructured":"Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In Advances in Neural Information Processing Systems, Vol.\u00a030. Curran Associates, Inc.https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/hash\/253614bbac999b38b5b60cae531c4969-Abstract.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.91"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2799227"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9436120"},{"key":"e_1_3_2_1_11_1","volume-title":"Developers Deserve Security Warnings","author":"Gorski Peter\u00a0Leo","year":"2018","unstructured":"Peter\u00a0Leo Gorski, Luigi\u00a0Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian M\u00f6ller, Yasemin Acar, and Sascha Fahl. 2018. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic {API} Misuse. 265\u2013281. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/gorski"},{"key":"e_1_3_2_1_12_1","volume-title":"Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. https:\/\/eprint.iacr.org\/2006\/309 Publication info: Published elsewhere. Extended abstract to appear in ACM CCS","author":"Goyal Vipul","year":"2006","unstructured":"Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. https:\/\/eprint.iacr.org\/2006\/309 Publication info: Published elsewhere. Extended abstract to appear in ACM CCS 2006. This is the full version.."},{"key":"e_1_3_2_1_13_1","unstructured":"Britta Hale and Chelsea Komlo. 2022. On End-to-End Encryption. https:\/\/eprint.iacr.org\/2022\/449 Publication info: Preprint. MINOR revision.."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442480"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Julie Haney Mary Theofanos Yasemin Acar and Sandra\u00a0Spickard Prettyman. 2018. Organizational views of NIST cryptographic standards and testing and validation programs. Technical Report NIST IR 8241. National Institute of Standards and Technology Gaithersburg MD. NIST IR 8241 pages. https:\/\/doi.org\/10.6028\/NIST.IR.8241","DOI":"10.6028\/NIST.IR.8241"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBCTIS55569.2022.00057"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2018.8663805"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.06.018"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860501"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2017.8256677"},{"key":"e_1_3_2_1_21_1","unstructured":"Aintzane Mosteiro-Sanchez Marc Barcel\u00f3 Jasone Astorga and Aitor Urbieta. 2022. All Cryptolibraries Are Beautiful But Some Are More Beautiful Than Others: A Survey of CP-ABE Libraries."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589951"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3567825"},{"key":"e_1_3_2_1_24_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Paterson G.","year":"2023","unstructured":"Kenneth\u00a0G. Paterson, Matteo Scarlata, and Kien\u00a0Tuong Truong. 2023. Three lessons from threema: Analysis of a secure messenger. In 32nd USENIX Security Symposium (USENIX Security 23). 1289\u20131306."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2017.8284289"},{"key":"e_1_3_2_1_26_1","unstructured":"Amit Sahai and Brent Waters. 2004. Fuzzy Identity Based Encryption. https:\/\/eprint.iacr.org\/2004\/086 Publication info: Published elsewhere. Unknown where it was published."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0060"},{"key":"e_1_3_2_1_28_1","unstructured":"Alexandr Silonosov. 2023. SECMAR Project: Enhancing Maritime Cybersecurity with Drones and Drone Management in the South Baltic Region."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"M. Sinnema S. Deelstra J. Nijhuis and J. Bosch. 2004. COVAMOF: A Framework for Modeling Variability in Software Product Families. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3154 (2004) 197\u2013213. https:\/\/doi.org\/10.1007\/978-3-540-28630-1_12 ISBN: 9783540229186.","DOI":"10.1007\/978-3-540-28630-1_12"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_15"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC53470.2022.9753999"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582811"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.65"},{"key":"e_1_3_2_1_34_1","unstructured":"Brent Waters. 2008. Ciphertext-Policy Attribute-Based Encryption: An Expressive Efficient and Provably Secure Realization. https:\/\/eprint.iacr.org\/2008\/290 Publication info: Published elsewhere. Unknown where it was published."},{"key":"e_1_3_2_1_35_1","volume-title":"Building an Encrypted and Searchable Audit Log. (Dec","author":"Waters Brent","year":"2003","unstructured":"Brent Waters, Dirk Balfanz, Glenn Durfee, and Diana Smetters. 2003. Building an Encrypted and Searchable Audit Log. (Dec. 2003)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3350925"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAAP60200.2023.10391571"},{"key":"e_1_3_2_1_38_1","unstructured":"Yang Zhao Pengcheng Fan H. Cai Zhiguang Qin and H. Xiong. 2017. Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare. Int. J. Netw. Secur. (2017). https:\/\/www.semanticscholar.org\/paper\/Attribute-based-Encryption-with-Non-Monotonic-in-Zhao-Fan\/69d30e6155489c6bc92eeabac5931ae99c2806c2"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:50:30Z","timestamp":1755881430000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":38,"alternative-id":["10.1145\/3664476.3670909","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670909","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}