{"id":"https://openalex.org/W2801931897","doi":"https://doi.org/10.23919/icitst.2017.8356404","title":"An architecture for privacy-preserving sharing of CTI with 3<sup>rd</sup> party analysis services","display_name":"An architecture for privacy-preserving sharing of CTI with 3<sup>rd</sup> party analysis services","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2801931897","doi":"https://doi.org/10.23919/icitst.2017.8356404","mag":"2801931897"},"language":"en","primary_location":{"id":"doi:10.23919/icitst.2017.8356404","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040772791","display_name":"Fabio Giubilo","orcid":null},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Fabio Giubilo","raw_affiliation_strings":["Security Futures Practice, British Telecommunications plc (BT), Adastral Park, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Security Futures Practice, British Telecommunications plc (BT), Adastral Park, United Kingdom","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051623294","display_name":"Ali Sajjad","orcid":"https://orcid.org/0000-0003-0150-8060"},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ali Sajjad","raw_affiliation_strings":["Security Futures Practice, British Telecommunications plc (BT), Adastral Park, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Security Futures Practice, British Telecommunications plc (BT), Adastral Park, United Kingdom","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002403009","display_name":"Mark Shackleton","orcid":null},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mark Shackleton","raw_affiliation_strings":["Security Futures Practice, British Telecommunications plc (BT), Adastral Park, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Security Futures Practice, British Telecommunications plc (BT), Adastral Park, United Kingdom","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048642442","display_name":"David Chadwick","orcid":"https://orcid.org/0000-0003-3145-055X"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David W. Chadwick","raw_affiliation_strings":["University of Kent, Canterbury, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Kent, Canterbury, United Kingdom","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058487069","display_name":"Wenjun Fan","orcid":"https://orcid.org/0000-0002-7363-9695"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Wenjun Fan","raw_affiliation_strings":["University of Kent, Canterbury, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Kent, Canterbury, United Kingdom","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084193428","display_name":"Rog\u00e9rio de Lemos","orcid":"https://orcid.org/0000-0002-0281-6308"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rogerio de Lemos","raw_affiliation_strings":["University of Kent, Canterbury, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Kent, Canterbury, United Kingdom","institution_ids":["https://openalex.org/I20581793"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5040772791"],"corresponding_institution_ids":["https://openalex.org/I1332878012"],"apc_list":null,"apc_paid":null,"fwci":1.9345,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.90408529,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"293","last_page":"297"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7289391756057739},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6744308471679688},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6414515376091003},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5449116230010986},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5381366610527039},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.49179747700691223},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.45397260785102844},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.44671061635017395},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.44343847036361694},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.42368996143341064},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4121685028076172},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3761235177516937}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7289391756057739},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6744308471679688},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6414515376091003},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5449116230010986},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5381366610527039},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.49179747700691223},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.45397260785102844},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.44671061635017395},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.44343847036361694},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.42368996143341064},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4121685028076172},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3761235177516937},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/icitst.2017.8356404","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356404","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},{"id":"pmh:oai:kar.kent.ac.uk:65817","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ICITST.2017.8356404>)","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W49688709","https://openalex.org/W986417423","https://openalex.org/W1412796528","https://openalex.org/W2023489998","https://openalex.org/W2029318567","https://openalex.org/W2043404742","https://openalex.org/W2062393199","https://openalex.org/W2152878782","https://openalex.org/W2157271418","https://openalex.org/W6628266772","https://openalex.org/W6683303322"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W2325765407","https://openalex.org/W618293728","https://openalex.org/W2788012436","https://openalex.org/W200604156","https://openalex.org/W4231184955","https://openalex.org/W2374784346","https://openalex.org/W2291845669","https://openalex.org/W4286615217","https://openalex.org/W3154723744"],"abstract_inverted_index":{"Increasing":[0],"numbers":[1],"of":[2,45,71,78,184,195,222,234],"Small":[3],"and":[4,36,63,68,101,106,151,158,187,220,242],"Medium":[5],"Enterprises":[6],"(SME)":[7],"are":[8,21],"outsourcing":[9],"or":[10,58,113,162],"hosting":[11],"their":[12,53,146,199],"services":[13,26,49,74,119],"on":[14],"different":[15,24,169,196],"Cloud":[16],"Service":[17],"Providers":[18],"(CSP).":[19],"They":[20],"also":[22,237],"using":[23,46],"security":[25,48,61,73,110,118],"from":[27,60,168],"these":[28,47,72],"CSPs":[29],"such":[30,202],"as":[31,142,192],"firewalls,":[32],"intrusion":[33],"detection/prevention":[34],"systems":[35],"anti-malware.":[37],"Although":[38],"for":[39,103,208],"the":[40,42,76,99,117,132,156,171,173,185,209,218],"SMEs":[41,94,133,197,229],"main":[43],"purpose":[44],"is":[50,75,84,95,130],"to":[51,108,127,137,154,181,227,230],"protect":[52],"cyber":[54],"assets,":[55],"either":[56],"physical":[57],"virtual,":[59],"threats":[62],"compromises,":[64],"a":[65,89,138,193,203],"very":[66],"useful":[67],"valuable":[69],"by-product":[70],"wealth":[77],"Cyber":[79],"Threat":[80],"Information":[81],"(CTI)":[82],"that":[83,96,131,190,225],"collected":[85],"over":[86],"time.":[87],"However,":[88],"common":[90],"problem":[91,129,136],"faced":[92],"by":[93,116,144],"they":[97,120],"lack":[98],"resources":[100],"expertise":[102],"monitoring,":[104],"analysing":[105],"reacting":[107],"any":[109],"notifications,":[111],"alerts":[112],"events":[114],"generated":[115],"have":[121],"subscribed":[122],"to.":[123],"An":[124],"obvious":[125],"solution":[126,224],"this":[128,135,149,177],"outsource":[134],"cloud":[139],"based":[140],"service":[141,150,207],"well,":[143],"sharing":[145,198,233],"CTI":[147,166,200],"with":[148,201],"allowing":[152],"it":[153],"analyse":[155],"information":[157],"generate":[159],"actionable":[160],"reports":[161],"patches.":[163],"The":[164],"more":[165],"obtained":[167],"SMEs,":[170],"better":[172],"analysis":[174,206,211],"result.":[175],"In":[176],"paper,":[178],"we":[179,213],"try":[180],"address":[182],"some":[183],"privacy":[186,241],"confidentiality":[188,243],"issues":[189],"arise":[191],"result":[194],"third":[204],"party":[205],"aggregate":[210],"scenario":[212],"just":[214],"described.":[215],"We":[216],"present":[217],"design":[219],"architecture":[221],"our":[223],"aims":[226],"allow":[228],"perform":[231],"policy-based":[232],"CTI,":[235],"while":[236],"offering":[238],"them":[239],"flexible":[240],"controls.":[244]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
