%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEE2015 IEEE Security and Privacy Workshops;2015; ; ;10.1109/SPW.2015.23data sharingcyber securityleast disclosurequalitative evaluationforward progressdata confinementminimal requisite fidelitypoker queriesmoderated queriesprivacy principlesPrivacy Principles for Sharing Cyber Security DataGina FiskCalvin ArdiNeale PickettJohn HeidemannMike FiskChristos Papadopoulos
2015 IEEE Security and Privacy Workshops193 May 201510.1109/SPW.2015.23197
endstream
endobj
2 0 obj
<>/XObject<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]/Font<>>>/Thumb 14 0 R/MediaBox[0 0 612 792]/Rotate 0>>
endobj
3 0 obj
<>
endobj
4 0 obj
<>stream
x+ |
endstream
endobj
5 0 obj
<>stream
HWKo6W
x8ER{dYLA@hn ֣8o=vh@HbWUor7]HQH$("Wi&J,yRx{\qwQ"o0sQ*+ů8tyFY+0n+g77C?TSU~*ʇ>g_}S6
]Nڡ˛]x.Q^$zVo0ˊww;٦rClڍMbV23yIH)εGӇ)yN1iDf%-6{&dm5[zwۆ9!|?,:uht$?++H4
n)k>Il9CۺYa͑@qc͎y*LsV;'prXFzbSvO
-ɋ<9GiG:
>6M,Ϭ Q?MM4^7nr!D-UC\6F63+_<9ͳD&őZJ2xCHp!ŌopvEx)RAĐe5(3v{ͫ$o=a.eƪ}KUUfNbi!R@M݀t&iz$phjF4A26=St?ô䅻ʅ AS)
?G^{>_nknun&!YsW4ƔQڨ"hH.SFB
,yLWxz ]Y,[jh_d >W~bb
ᯅ! |&iq*] :xi :@
eppeM5yLB[Srn>\04?hs6fPME3Şޗ~8gK9@~~:
"LRf7"cúok6bHէdtNLX9~Dӯ$_MY*R4&Y'k*n~j#Sgf}i8,ނBXݳXJMD`@e/E2@ jAXȥ2]ӿy>Lil#!mS1L7_