{"id":"https://openalex.org/W2470028496","doi":"https://doi.org/10.1007/978-3-319-39814-3_11","title":"In Whom Do We Trust - Sharing Security Events","display_name":"In Whom Do We Trust - Sharing Security Events","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2470028496","doi":"https://doi.org/10.1007/978-3-319-39814-3_11","mag":"2470028496"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-39814-3_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-39814-3_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01632748","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029207157","display_name":"Jessica Steinberger","orcid":null},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]},{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["DE","NL"],"is_corresponding":true,"raw_author_name":"Jessica Steinberger","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051604044","display_name":"Benjamin Kuhnert","orcid":null},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Benjamin Kuhnert","raw_affiliation_strings":["da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025537461","display_name":"Anna Sperotto","orcid":"https://orcid.org/0000-0002-9481-5846"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Anna Sperotto","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106131994","display_name":"Harald Baier","orcid":null},"institutions":[{"id":"https://openalex.org/I107257983","display_name":"Darmstadt University of Applied Sciences","ror":"https://ror.org/047wbd030","country_code":"DE","type":"education","lineage":["https://openalex.org/I107257983"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Harald Baier","raw_affiliation_strings":["da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security Research Group, Hochschule Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I107257983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","University of Twente, Enschede, Overijssel, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems (DACS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"University of Twente, Enschede, Overijssel, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029207157"],"corresponding_institution_ids":["https://openalex.org/I107257983","https://openalex.org/I94624287"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":15.5487,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.98875967,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8107434511184692},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7436097264289856},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.580726146697998},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5315202474594116},{"id":"https://openalex.org/keywords/dissemination","display_name":"Dissemination","score":0.48972466588020325},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.48738032579421997},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4794410765171051},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.44258615374565125},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4389808177947998},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.43527668714523315},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.42714303731918335},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3848593235015869},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.38464510440826416},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22325482964515686},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1708989441394806},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.0823504626750946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8107434511184692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7436097264289856},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.580726146697998},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5315202474594116},{"id":"https://openalex.org/C101780184","wikidata":"https://www.wikidata.org/wiki/Q840576","display_name":"Dissemination","level":2,"score":0.48972466588020325},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.48738032579421997},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4794410765171051},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.44258615374565125},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4389808177947998},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.43527668714523315},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.42714303731918335},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3848593235015869},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.38464510440826416},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22325482964515686},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1708989441394806},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0823504626750946},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-319-39814-3_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-39814-3_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/a70f67de-8b13-424a-9beb-0a2d30db2a41","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/a70f67de-8b13-424a-9beb-0a2d30db2a41","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Steinberger, J, Kuhnert, B, Sperotto, A, Baier, H & Pras, A 2016, In Whom Do We Trust - Sharing Security Events. in Proceedings of the 10th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2016). Lecture Notes in Computer Science, vol. 9701, Springer, London, pp. 111-124, 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016, Munich, Germany, 20/06/16. https://doi.org/10.1007/978-3-319-39814-3_11","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-01632748v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01632748","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, &#x27E8;10.1007/978-3-319-39814-3_11&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:ris.utwente.nl:publications/a70f67de-8b13-424a-9beb-0a2d30db2a41","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01632748v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01632748","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, &#x27E8;10.1007/978-3-319-39814-3_11&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W921635266","https://openalex.org/W1553810244","https://openalex.org/W1563031510","https://openalex.org/W1575376224","https://openalex.org/W2092642267","https://openalex.org/W2093320808","https://openalex.org/W2136229460","https://openalex.org/W2143950972","https://openalex.org/W2161644106","https://openalex.org/W2171548560","https://openalex.org/W2183161023","https://openalex.org/W2212628139","https://openalex.org/W2247392973","https://openalex.org/W2256845964","https://openalex.org/W2318191508"],"related_works":["https://openalex.org/W2033357182","https://openalex.org/W2065250680","https://openalex.org/W2336014427","https://openalex.org/W2092708554","https://openalex.org/W2353177111","https://openalex.org/W2608550600","https://openalex.org/W139145738","https://openalex.org/W2495229164","https://openalex.org/W2027552121","https://openalex.org/W2387034603"],"abstract_inverted_index":{"Security":[0],"event":[1,33,178,205,218],"sharing":[2,34,141],"is":[3,35,50,108,124,188,236],"deemed":[4],"of":[5,132,139,175,185,202,216,228],"critical":[6],"importance":[7],"to":[8,37,75,98,109,143,161,169,189,208,240,247],"counteract":[9],"large-scale":[10],"attacks":[11,20],"at":[12],"Internet":[13],"service":[14],"provider":[15],"(ISP)":[16],"networks":[17],"as":[18,129],"these":[19],"have":[21],"become":[22],"larger,":[23],"more":[24],"sophisticated":[25],"and":[26,42,82,87,102,120,155,167,173,180,198,212,238,252],"frequent.":[27],"On":[28,45],"the":[29,46,67,103,136,176,214,221,226],"one":[30],"hand,":[31,48],"security":[32,89,111,118,163,177,204,217],"regarded":[36],"speed":[38],"up":[39],"organization\u2019s":[40],"mitigation":[41,81,123],"response":[43,83],"capabilities.":[44],"other":[47],"it":[49],"currently":[51,125],"done":[52],"on":[53],"an":[54],"ad-hoc":[55],"basis":[56],"via":[57],"email,":[58],"member":[59],"calls":[60],"or":[61],"in":[62,94,206,225,245],"personal":[63,137],"meetings":[64],"only":[65],"under":[66],"premise":[68],"that":[69,194,232],"participating":[70],"partners":[71],"are":[72,85,91,158],"personally":[73],"known":[74],"each":[76,140],"other.":[77],"As":[78],"a":[79,130,191,196,199,203,242],"consequence,":[80],"actions":[84],"delayed":[86],"thus":[88],"events":[90,112,119],"not":[92,126,147,159],"processed":[93],"time.":[95],"One":[96],"approach":[97],"reduce":[99],"this":[100,186,233],"delay":[101],"time":[104],"for":[105],"manual":[106],"processing":[107],"disseminate":[110],"among":[113],"trusted":[114],"partners.":[115],"However,":[116],"exchanging":[117],"semi-automatically":[121],"deploying":[122],"well":[127],"established":[128],"result":[131],"two":[133],"shortcomings.":[134],"First,":[135],"knowledge":[138,200],"partner":[142],"develop":[144],"trust":[145,192,197,234,243],"does":[146],"scale":[148],"very":[149],"well.":[150],"Second,":[151],"current":[152],"exchange":[153,222],"formats":[154],"protocols":[156],"often":[157],"able":[160],"use":[162],"mechanisms":[164],"(e.g.,":[165],"encryption":[166],"signature)":[168],"ensure":[170],"both":[171],"confidentiality":[172],"integrity":[174],"information":[179,219,249],"its":[181,253],"remediation.":[182],"The":[183],"goal":[184],"paper":[187],"present":[190],"model":[193,235],"determines":[195],"level":[201],"order":[207,246],"deploy":[209],"semi-automated":[210],"remediations":[211],"facilitate":[213],"dissemination":[215],"using":[220],"format":[223],"FLEX":[224],"context":[227],"ISPs.":[229],"We":[230],"show":[231],"scalable":[237],"helps":[239],"build":[241],"community":[244],"share":[248],"about":[250],"threats":[251],"remediation":[254],"suggestions.":[255]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
