An architecture for privacy-preserving sharing of CTI with 3rd party analysis services
暂无分享,去创建一个
David W. Chadwick | Rogério de Lemos | Wenjun Fan | Ali Sajjad | Mark Shackleton | Fabio Giubilo | R. D. Lemos | D. Chadwick | M. Shackleton | Ali Sajjad | Wenjun Fan | F. Giubilo
[1] Xiaohong Yuan,et al. Cloud computing and security challenges , 2012, ACM-SE '12.
[2] Ilaria Matteucci,et al. Towards safer information sharing in the cloud , 2014, International Journal of Information Security.
[3] Jorge Lobo,et al. The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.
[4] Zhi Li,et al. Cloud computing risk assessment method based on game theory , 2015 .
[5] Keke Chen,et al. Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation , 2009, IEEE Transactions on Parallel and Distributed Systems.
[6] Renaud Sirdey,et al. Armadillo: A Compilation Chain for Privacy Preserving Applications , 2015, IACR Cryptol. ePrint Arch..
[7] Y. Hasuda R. Fuchs. Fundamental Modelling Concept for IVT Analysis and Control Development , 2002 .
[8] Fabio Martinelli,et al. A Formal Support for Collaborative Data Sharing , 2012, CD-ARES.
[9] Ilaria Matteucci,et al. CNL4DSA: a controlled natural language for data sharing agreements , 2010, SAC '10.
[10] Marinella Petrocchi,et al. Legal and Technical Perspectives in Data Sharing Agreements Definition , 2015, APF.
[11] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[12] Theodosis Dimitrakos,et al. Integrating Security Services in Cloud Service Stores , 2015, IFIPTM.