{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:36:31Z","timestamp":1725730591729},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389078"},{"type":"electronic","value":"9783642389085"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38908-5_5","type":"book-chapter","created":{"date-parts":[[2013,6,10]],"date-time":"2013-06-10T02:18:23Z","timestamp":1370830703000},"page":"65-82","source":"Crossref","is-referenced-by-count":0,"title":["Limiting Data Exposure in Monitoring Multi-domain Policy Conformance"],"prefix":"10.1007","author":[{"given":"Mirko","family":"Montanari","sequence":"first","affiliation":[]},{"given":"Jun Ho","family":"Huh","sequence":"additional","affiliation":[]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[]},{"given":"Roy H.","family":"Campbell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"5_CR1","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1145\/182.358434","volume":"26","author":"J.F. Allen","year":"1983","unstructured":"Allen, J.F.: Maintaining knowledge about temporal intervals. Communications of the ACM\u00a026(11), 832\u2013843 (1983)","journal-title":"Communications of the ACM"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., Morrow, M.: Blueprint for the intercloud-protocols and formats for cloud computing interoperability. In: ICIW 2009, pp. 328\u2013336. IEEE (2009)","DOI":"10.1109\/ICIW.2009.55"},{"key":"5_CR3","unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: Sepia: Privacy-preserving aggregation of multi-domain network events and statistics. USENIX Sec (2010)"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/69.43410","volume":"1","author":"S. Ceri","year":"1989","unstructured":"Ceri, S., Gottlob, G., Tanca, L.: What you always wanted to know about Datalog (and never dared to ask). IEEE Transactions on Knowledge and Data Engineering\u00a01(1), 146\u2013166 (1989)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"5_CR5","unstructured":"Grawrock, D.: The Intel Safer Computing Initiative, ch. 1-2, pp. 3\u201331. Intel Press (2006)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Denker, G., Gehani, A., Kim, M., Hanz, D.: Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies. In: IEEE POLICY (2010)","DOI":"10.1109\/POLICY.2010.33"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Evans, D., Eyers, D.: Efficient Policy Checking across Administrative Domains. In: IEEE POLICY (2010)","DOI":"10.1109\/POLICY.2010.36"},{"key":"5_CR8","unstructured":"Giblin, C., M\u00fcller, S., Pfitzmann, B.: From regulatory policies to event monitoring rules: Towards model-driven compliance automation. IBM Research Zurich, Report RZ, 3662 (2006)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Goldreich, O.: Foundations of Cryptography. Basic Applications, vol.\u00a02. Cambridge University Press (2004)","DOI":"10.1017\/CBO9780511721656"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium (2011)","DOI":"10.1007\/978-3-642-25560-1_2"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Huang, Y., Katz, J., Evans, D.: Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In: IEEE Symposium on Security and Privacy (2012)","DOI":"10.1109\/SP.2012.43"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-00587-9_11","volume-title":"Trusted Computing","author":"J.H. Huh","year":"2009","unstructured":"Huh, J.H., Lyle, J.: Trustworthy Log Reconciliation for Distributed Virtual Organisations. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol.\u00a05471, pp. 169\u2013182. Springer, Heidelberg (2009)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Huh, J.H., Martin, A.: Towards a Trustable Virtual Organisation. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 425\u2013431. IEEE (August 2009)","DOI":"10.1109\/ISPA.2009.72"},{"key":"5_CR14","unstructured":"Hunt, P., Konar, M., Junqueira, F.P., Reed, B.: Zookeeper: Wait-free coordination for internet-scale systems. In: USENIX ATC, vol.\u00a010 (2010)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-45146-4_9","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y. Ishai","year":"2003","unstructured":"Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 145\u2013161. Springer, Heidelberg (2003)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Lee, A.J., Tabriz, P., Borisov, N.: A privacy-preserving interdomain audit framework. In: WPES. ACM (2006)","DOI":"10.1145\/1179601.1179620"},{"key":"5_CR17","unstructured":"Lincoln, P., Porras, P., Shmatikov, V.: Privacy-preserving sharing and correction of security alerts. In: USENIX Security Symposium (2004)"},{"key":"5_CR18","first-page":"292","volume":"500","author":"F. Liu","year":"2011","unstructured":"Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: Nist cloud computing reference architecture. NIST Special Publication\u00a0500, 292 (2011)","journal-title":"NIST Special Publication"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Montanari, M., Campbell, R.H.: Confidentiality of event data in policy-based monitoring. In: Dependable Systems and Networks, DSN 2012. IEEE (2012)","DOI":"10.1109\/DSN.2012.6263954"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Montanari, M., Cook, L.T., Campbell, R.H.: Multi-organization policy-based monitoring. In: IEEE POLICY 2012 (2012)","DOI":"10.1109\/POLICY.2012.18"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Montanari, M., Huh, J.H., Dagit, D., Bobba, R.B., Campbell, R.H.: Evidence of log integrity in policy-based security monitoring. In: Dependable Systems and Networks Workshops, DSN-W 2012. IEEE (2012)","DOI":"10.1109\/DSNW.2012.6264693"},{"key":"5_CR22","unstructured":"O\u2019Keefe, C.M.: Privacy and the use of health data - reducing disclosure risk. In: Health Informatics (2008)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Pang, R.: A high-level programming environment for packet trace anonymization and transformation. In: ACM SIGCOMM, Germany (2003)","DOI":"10.1145\/863993.863994"},{"key":"5_CR24","unstructured":"Payment Card Industry (PCI) Security Standard Council. Data security standard version 1.1 (2006)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Ross, R., Katzke, S., Johnson, A., Swanson, M., Stoneburner, G., Rogers, G., Lee, A.: Recommended security controls for federal information systems (final public draft; nist sp 800-53) (2005)","DOI":"10.6028\/NIST.SP.800-53"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Singh, J., Vargas, L., Bacon, J., Moody, K.: Policy-Based Information Sharing in Publish\/Subscribe Middleware. In: IEEE POLICY (2008)","DOI":"10.1109\/POLICY.2008.17"},{"key":"5_CR27","unstructured":"Slagell, A., Lakkaraju, K., Luo, K.: Flaim: A multi-level anonymization framework for computer and network logs. In: LISA (2006)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38908-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:24:02Z","timestamp":1557793442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38908-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389078","9783642389085"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38908-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}