{"id":"https://openalex.org/W4392399529","doi":"https://doi.org/10.5220/0012358700003648","title":"APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems","display_name":"APP-CEP: Adaptive Pattern-Level Privacy Protection in Complex Event Processing Systems","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4392399529","doi":"https://doi.org/10.5220/0012358700003648"},"language":"en","primary_location":{"id":"doi:10.5220/0012358700003648","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012358700003648","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0012358700003648","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084792170","display_name":"Majid Lotfian Delouee","orcid":"https://orcid.org/0000-0003-1326-7540"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Majid Lotfian Delouee","raw_affiliation_strings":["Bernoulli Institute, University of Groningen, Groningen, Netherlands, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Bernoulli Institute, University of Groningen, Groningen, Netherlands, --- Select a Country ---","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030949796","display_name":"Viktoriya Degeler","orcid":"https://orcid.org/0000-0001-7054-3770"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Victoria Degeler","raw_affiliation_strings":["Informatics Institute, University of Amsterdam, Amsterdam, Netherlands, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Informatics Institute, University of Amsterdam, Amsterdam, Netherlands, --- Select a Country ---","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025996509","display_name":"Peter Amthor","orcid":"https://orcid.org/0000-0001-7711-4450"},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Peter Amthor","raw_affiliation_strings":["Department of Computer Science and Automation, Technische Universit\u00e4t Ilmenau, Ilmenau, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Automation, Technische Universit\u00e4t Ilmenau, Ilmenau, Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I119449181"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025082646","display_name":"Boris Koldehofe","orcid":"https://orcid.org/0000-0002-1588-2056"},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Boris Koldehofe","raw_affiliation_strings":["Department of Computer Science and Automation, Technische Universit\u00e4t Ilmenau, Ilmenau, Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Automation, Technische Universit\u00e4t Ilmenau, Ilmenau, Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I119449181"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084792170"],"corresponding_institution_ids":["https://openalex.org/I169381384"],"apc_list":null,"apc_paid":null,"fwci":0.6768,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.678483,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"486","last_page":"497"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.711033284664154},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5298411846160889},{"id":"https://openalex.org/keywords/complex-event-processing","display_name":"Complex event processing","score":0.5225838422775269},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.48213502764701843},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41617459058761597},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.08372747898101807},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07610622048377991}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.711033284664154},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5298411846160889},{"id":"https://openalex.org/C123606473","wikidata":"https://www.wikidata.org/wiki/Q907918","display_name":"Complex event processing","level":3,"score":0.5225838422775269},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.48213502764701843},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41617459058761597},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.08372747898101807},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07610622048377991},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.5220/0012358700003648","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012358700003648","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:dare.uva.nl:openaire_cris_publications/0a5a6035-e779-4d09-8c8f-4929bb9d6f6d","is_oa":false,"landing_page_url":"https://handle.uba.uva.nl/personal/pure/en/publications/appcep-adaptive-patternlevel-privacy-protection-in-complex-event-processing-systems(0a5a6035-e779-4d09-8c8f-4929bb9d6f6d).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lotfian Delouee, M, Degeler, V, Amthor, P & Koldehofe, B 2024, APP-CEP: Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems. in G Lenzini, P Mori & S Furnell (eds), ICISSP 2024 : Proceedings of the 10th International Conference on Information Systems Security and Privacy : 26-28 February, 2024, Rome, Italy. Setu\u0301bal, pp. 486-497, International Conference on Information Systems Security and Privacy , Rome, Italy, 26/02/24. https://doi.org/10.5220/0012358700003648","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.rug.nl:openaire/9ccf3872-64be-4b89-8ad0-beff3b46b233","is_oa":false,"landing_page_url":"https://research.rug.nl/en/publications/9ccf3872-64be-4b89-8ad0-beff3b46b233","pdf_url":null,"source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lotfian Delouee, M, Degeler, V, Amthor, P & Koldehofe, B 2024, APP-CEP : Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems. in G Lenzini, P Mori & S Furnell (eds), 10th International Conference on Information Systems Security and Privacy (ICISSP\u201924). vol. 1, SCITEPRESS \u2013 Science and Technology Publications, pp. 486-497, International Conference on Information Systems Security and Privacy (ICISSP'24), Rome, Italy, 26/02/2024. https://doi.org/10.5220/0012358700003648","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.rug.nl:openaire_cris_publications/9ccf3872-64be-4b89-8ad0-beff3b46b233","is_oa":false,"landing_page_url":"https://research.rug.nl/files/1258343886/123587.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lotfian Delouee, M, Degeler, V, Amthor, P & Koldehofe, B 2024, APP-CEP : Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems. in G Lenzini, P Mori & S Furnell (eds), 10th International Conference on Information Systems Security and Privacy (ICISSP\u201924). vol. 1, SCITEPRESS \u2013 Science and Technology Publications, pp. 486-497, International Conference on Information Systems Security and Privacy (ICISSP'24), Rome, Italy, 26/02/2024. https://doi.org/10.5220/0012358700003648","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.rug.nl:publications/9ccf3872-64be-4b89-8ad0-beff3b46b233","is_oa":true,"landing_page_url":"https://hdl.handle.net/11370/9ccf3872-64be-4b89-8ad0-beff3b46b233","pdf_url":null,"source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lotfian Delouee, M, Degeler, V, Amthor, P & Koldehofe, B 2024, APP-CEP : Adaptive Pattern-level Privacy Protection in Complex Event Processing Systems. in G Lenzini, P Mori & S Furnell (eds), 10th International Conference on Information Systems Security and Privacy (ICISSP\u201924). vol. 1, SCITEPRESS \u2013 Science and Technology Publications, pp. 486-497, International Conference on Information Systems Security and Privacy (ICISSP'24), Rome, Italy, 26/02/2024. https://doi.org/10.5220/0012358700003648","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:www.db-thueringen.de:dbt_mods_00069584","is_oa":true,"landing_page_url":"https://www.db-thueringen.de/receive/dbt_mods_00069584","pdf_url":null,"source":{"id":"https://openalex.org/S4306400120","display_name":"Common Library Network (Der Gemeinsame Bibliotheksverbund)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210149878","host_organization_name":"Verbundzentrale des GBV","host_organization_lineage":["https://openalex.org/I4210149878"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:BookPart"}],"best_oa_location":{"id":"doi:10.5220/0012358700003648","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0012358700003648","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1188904525","display_name":null,"funder_award_id":"311197","funder_id":"https://openalex.org/F4320323299","funder_display_name":"Norges Forskningsr\u00e5d"}],"funders":[{"id":"https://openalex.org/F4320323299","display_name":"Norges Forskningsr\u00e5d","ror":"https://ror.org/00epmv149"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1607805252","https://openalex.org/W2397597979","https://openalex.org/W2799235612","https://openalex.org/W4403547452","https://openalex.org/W1835640443","https://openalex.org/W4308672222","https://openalex.org/W413387906","https://openalex.org/W2072592647"],"abstract_inverted_index":{"Although":[0],"privacy-preserving":[1],"mechanisms":[2],"endeavor":[3],"to":[4,68,73,78,112,132,150],"safeguard":[5],"sensitive":[6,124],"information":[7],"at":[8],"the":[9,49,53,83,141,157,162,186,195,198],"attribute":[10],"level,":[11],"detected":[12],"event":[13,23],"patterns":[14,130],"can":[15],"still":[16,40],"disclose":[17],"privacy-sensitive":[18],"knowledge":[19,142,188],"in":[20,48,59,86,166,197],"distributed":[21],"complex":[22],"processing":[24],"systems":[25,61],"(DCEP).":[26],"Events":[27],"might":[28,144],"not":[29],"be":[30,145],"inherently":[31],"sensitive,":[32],"but":[33],"their":[34],"aggregation":[35],"into":[36],"a":[37,167,182],"pattern":[38,108],"could":[39],"breach":[41],"privacy.":[42],"In":[43],"this":[44],"paper,":[45],"we":[46,76,91,139],"study":[47],"context":[50],"of":[51,55,65,82,102,136,164],"APP-CEP":[52,165,179],"problem":[54],"integrating":[56],"pattern-level":[57],"privacy":[58,80,95,103,152],"event-based":[60],"by":[62,147],"selective":[63],"assignment":[64],"obfuscation":[66,158],"techniques":[67,116],"conceal":[69],"private":[70],"information.":[71],"Compared":[72],"state-of-the-art":[74],"techniques,":[75],"seek":[77],"enforce":[79],"independent":[81],"actual":[84],"events":[85],"streams.":[87,200],"To":[88],"support":[89],"this,":[90],"acquire":[92],"queries":[93],"and":[94,153],"requirements":[96],"using":[97],"CEP-like":[98],"patterns.":[99],"The":[100],"protection":[101],"is":[104],"accomplished":[105],"through":[106],"generating":[107],"dependency":[109],"graphs,":[110],"leading":[111],"dynamically":[113],"appointing":[114],"those":[115],"that":[117,143,178],"have":[118],"no":[119],"consequences":[120],"on":[121,156],"detecting":[122],"other":[123],"patterns,":[125],"as":[126,128],"well":[127],"non-sensitive":[129],"required":[131],"provide":[133],"acceptable":[134],"Quality":[135],"Service.":[137],"Besides,":[138],"model":[140],"possessed":[146],"potential":[148],"adversaries":[149,192],"violate":[151],"its":[154],"impacts":[155],"procedure.":[159],"We":[160],"assessed":[161],"performance":[163],"real-world":[168],"scenario":[169],"involving":[170],"an":[171],"online":[172],"retailer\u2019s":[173],"transactions.":[174],"Our":[175],"evaluation<br/>results":[176],"demonstrate":[177],"successfully":[180],"provides":[181],"privacy-utility":[183],"trade-off.":[184],"Modeling":[185],"background":[187],"also":[189],"effectively":[190],"prevents":[191],"from":[193],"realizing":[194],"modifications":[196],"input":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2024-03-05T00:00:00"}
