iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1016/J.COSE.2016.12.011
{"id":"https://openalex.org/W2560911655","doi":"https://doi.org/10.1016/j.cose.2016.12.011","title":"PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing","display_name":"PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing","publication_year":2016,"publication_date":"2016-12-27","ids":{"openalex":"https://openalex.org/W2560911655","doi":"https://doi.org/10.1016/j.cose.2016.12.011","mag":"2560911655"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.cose.2016.12.011","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://e-archivo.uc3m.es/bitstream/10016/27128/1/pracis_CS_2017_ps.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091681007","display_name":"Jos\u00e9 M. de Fuentes","orcid":"https://orcid.org/0000-0002-4023-3197"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jos\u00e9 M. de Fuentes","raw_affiliation_strings":["Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051341942","display_name":"Lorena Gonz\u00e1lez\u2010Manzano","orcid":"https://orcid.org/0000-0002-3490-621X"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Lorena Gonz\u00e1lez-Manzano","raw_affiliation_strings":["Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070199150","display_name":"Juan Tapiador","orcid":"https://orcid.org/0000-0002-4573-3967"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Tapiador","raw_affiliation_strings":["Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004222325","display_name":"Pedro Peris-L\u00f3pez","orcid":"https://orcid.org/0000-0001-6943-0760"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pedro Peris-Lopez","raw_affiliation_strings":["Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Universidad Carlos III de Madrid, Avda. Universidad, 30, 28911 Legan\u00e9s, Madrid, Spain","institution_ids":["https://openalex.org/I50357001"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5091681007"],"corresponding_institution_ids":["https://openalex.org/I50357001"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190,"provenance":"doaj"},"apc_paid":null,"fwci":3.381,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":47,"citation_normalized_percentile":{"value":0.94748,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"69","issue":null,"first_page":"127","last_page":"141"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/publication","display_name":"Publication","score":0.6340332},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6127963},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5451287},{"id":"https://openalex.org/keywords/security-policies","display_name":"Security Policies","score":0.527767},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.511982},{"id":"https://openalex.org/keywords/information-sharing","display_name":"Information sharing","score":0.45506617},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4547836},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.44038135}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8520382},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7215591},{"id":"https://openalex.org/C41458344","wikidata":"https://www.wikidata.org/wiki/Q732577","display_name":"Publication","level":2,"score":0.6340332},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.63089216},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6127963},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.58120394},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5451287},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5191397},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5013919},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.4947221},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.47909215},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47804314},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.45925778},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.45506617},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4547836},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.44038135},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34649575},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2585839},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17005137},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1016/j.cose.2016.12.011","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/10016/27128","pdf_url":"https://e-archivo.uc3m.es/bitstream/10016/27128/1/pracis_CS_2017_ps.pdf","source":{"id":"https://openalex.org/S4306402641","display_name":"LA Referencia (Red Federada de Repositorios Institucionales de Publicaciones Cient\u00edficas)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4383465926","host_organization_name":"LA Referencia","host_organization_lineage":["https://openalex.org/I4383465926"],"host_organization_lineage_names":["LA Referencia"],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://hdl.handle.net/10016/27128","pdf_url":"https://e-archivo.uc3m.es/bitstream/10016/27128/1/pracis_CS_2017_ps.pdf","source":{"id":"https://openalex.org/S4306402641","display_name":"LA Referencia (Red Federada de Repositorios Institucionales de Publicaciones Cient\u00edficas)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4383465926","host_organization_name":"LA Referencia","host_organization_lineage":["https://openalex.org/I4383465926"],"host_organization_lineage_names":["LA Referencia"],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[{"score":0.59,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[{"funder":"https://openalex.org/F4320323770","funder_display_name":"Universidad Carlos III de Madrid","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":73,"referenced_works":["https://openalex.org/W1018090636","https://openalex.org/W1481916896","https://openalex.org/W1535147830","https://openalex.org/W1537498185","https://openalex.org/W1566166064","https://openalex.org/W1579116073","https://openalex.org/W1673464365","https://openalex.org/W1771504935","https://openalex.org/W1868711929","https://openalex.org/W1925603120","https://openalex.org/W1971361579","https://openalex.org/W1973735641","https://openalex.org/W1982763286","https://openalex.org/W198324312","https://openalex.org/W1984946784","https://openalex.org/W1989168465","https://openalex.org/W1999627326","https://openalex.org/W2001783515","https://openalex.org/W2011015937","https://openalex.org/W2013627100","https://openalex.org/W2014316112","https://openalex.org/W2017815160","https://openalex.org/W2052397812","https://openalex.org/W2058009253","https://openalex.org/W2059315043","https://openalex.org/W2073887882","https://openalex.org/W2086033890","https://openalex.org/W2091794203","https://openalex.org/W2105564033","https://openalex.org/W2107927428","https://openalex.org/W2113272630","https://openalex.org/W2119676903","https://openalex.org/W2122265331","https://openalex.org/W2131076145","https://openalex.org/W2132172731","https://openalex.org/W2142889610","https://openalex.org/W2175095132","https://openalex.org/W2180738388","https://openalex.org/W2226036374","https://openalex.org/W2244775721","https://openalex.org/W2246880961","https://openalex.org/W2294382750","https://openalex.org/W2339166448","https://openalex.org/W2464548783","https://openalex.org/W2467562378","https://openalex.org/W2481077822","https://openalex.org/W2491454545","https://openalex.org/W2510021091","https://openalex.org/W2545211094","https://openalex.org/W2547209441","https://openalex.org/W2610843768","https://openalex.org/W269948224","https://openalex.org/W2744455103","https://openalex.org/W2772875880","https://openalex.org/W2912654124","https://openalex.org/W2915064390","https://openalex.org/W2951691122","https://openalex.org/W3125210271","https://openalex.org/W3158503066","https://openalex.org/W3186276894","https://openalex.org/W3204139930","https://openalex.org/W4232937315","https://openalex.org/W4236611000","https://openalex.org/W4236678724","https://openalex.org/W4242582838","https://openalex.org/W4245015688","https://openalex.org/W4249721693","https://openalex.org/W4253738119","https://openalex.org/W4316253332","https://openalex.org/W50561992","https://openalex.org/W618475404","https://openalex.org/W748515386","https://openalex.org/W94020394"],"related_works":["https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W4313300189","https://openalex.org/W3012147850","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W2539930818","https://openalex.org/W2361642710","https://openalex.org/W2348928709","https://openalex.org/W187169919"],"abstract_inverted_index":{"Cooperative":[0],"cyberdefense":[1],"has":[2],"been":[3],"recognized":[4],"as":[5,143],"an":[6,33,70],"essential":[7],"strategy":[8],"to":[9,37,42,57,98,180],"fight":[10],"against":[11],"cyberattacks.":[12],"Cybersecurity":[13],"Information":[14,124],"Sharing":[15],"(CIS),":[16],"especially":[17],"about":[18],"threats":[19],"and":[20,40,86,116,154,205],"incidents,":[21],"is":[22,47,62,67,209],"a":[23,75,106,164,169],"key":[24],"aspect":[25],"in":[26,49,201,226],"this":[27,50,101],"regard.":[28],"CIS":[29,66,89,109],"provides":[30],"members":[31],"with":[32,136,163],"improved":[34],"situational":[35],"awareness":[36],"prepare":[38],"for":[39,88,108,168],"respond":[41],"future":[43],"cyberthreats.":[44],"Privacy":[45],"preservation":[46,97],"critical":[48,64],"context,":[51],"since":[52],"organizations":[53],"can":[54,132,197],"be":[55,133,198],"reluctant":[56],"share":[58],"information":[59],"otherwise.":[60],"This":[61],"particularly":[63],"when":[65],"facilitated":[68],"through":[69],"untrusted":[71],"infrastructure":[72],"provided":[73],"by":[74,150,221],"third":[76],"party":[77],"(e.g.,":[78],"the":[79,120,187,206,218],"cloud).":[80],"Despite":[81],"this,":[82],"current":[83],"data":[84,114,128],"formats":[85],"protocols":[87],"do":[90],"not":[91],"guarantee":[92],"any":[93],"form":[94],"of":[95,171,190,194],"privacy":[96],"participants.":[99],"In":[100],"paper":[102],"we":[103],"introduce":[104],"PRACIS,":[105],"scheme":[107],"networks":[110],"that":[111,175,217],"guarantees":[112],"private":[113],"forwarding":[115],"aggregation.":[117],"PRACIS":[118,131,146,222],"leverages":[119],"well-known":[121],"Structured":[122],"Threat":[123],"Expression":[125],"(STIX)":[126],"standard":[127,152],"format.":[129],"Remarkably,":[130],"seamlessly":[134],"integrated":[135],"existing":[137],"STIX-based":[138],"message":[139],"brokering":[140],"middleware":[141],"such":[142],"publish-subscribe":[144],"architectures.":[145],"achieves":[147],"these":[148,214],"goals":[149],"combining":[151],"format-preserving":[153],"homomorphic":[155],"encryption":[156],"primitives.":[157],"We":[158],"discuss":[159],"experimental":[160],"results":[161,215],"obtained":[162],"prototype":[165],"implementation":[166],"developed":[167],"subset":[170],"STIX.":[172],"Results":[173],"show":[174],"entities":[176],"may":[177],"create":[178],"up":[179],"689":[181],"incidents":[182,196],"per":[183],"minute,":[184],"far":[185],"beyond":[186],"estimated":[188],"average":[189],"81.":[191],"Moreover,":[192],"aggregation":[193],"104":[195],"carried":[199],"out":[200],"just":[202,210],"2.1":[203],"s,":[204],"transmission":[207],"overhead":[208],"13.5":[211],"kbps.":[212],"Overall,":[213],"suggest":[216],"costs":[219],"incurred":[220],"are":[223],"easily":[224],"affordable":[225],"real-world":[227],"scenarios.":[228]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2560911655","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":2}],"updated_date":"2024-11-22T17:08:15.093879","created_date":"2017-01-06"}