2011
DOI: 10.1007/978-3-642-21694-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity and Privacy in Distributed Early Warning Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…In 2010 Brunner et al [8] proposed a concept combing Traceable Anonymous Certificates and anonymous Peer-to-Peer Overlay Networks such as GNUnet to address anonymity and privacy issues for IT early warning systems. This paper leaves the selection and sanitization of the exchanged data to the originator of an early warning message and focuses on the aspects of originator anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…In 2010 Brunner et al [8] proposed a concept combing Traceable Anonymous Certificates and anonymous Peer-to-Peer Overlay Networks such as GNUnet to address anonymity and privacy issues for IT early warning systems. This paper leaves the selection and sanitization of the exchanged data to the originator of an early warning message and focuses on the aspects of originator anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…In 2010 Brunner et al [8] proposed a concept combing Traceable Anonymous Certificates (TAC, RFC 5636) and anonymous Peer-to-Peer Overlay Networks such as GNUnet to address anonymity and privacy issues for IT early warning systems. Similar to our approach this paper also leaves the selection and sanitization of the exchanged data to the originator of an early warning message and focuses on the aspects of originator anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…As far as operational TI architectures are concerned, broadly available platforms, such as AlienVault Open Threat Exchange, Malware Information Sharing Project, or ThreatView's Cyber Threat & Reputation Intelligence, have been developed either commercially or by community‐driven projects. The scientific research has been focusing on conceptual models of TI architectures or methodologies of their development, deployment, and governance …”
Section: Related Workmentioning
confidence: 99%
“…A prototype of the architecture was implemented using an open‐source CMS. Alternatively, Klump and Kwiatkowski proposed an architecture for sharing cyberincident information among smart grid stakeholders, while Brunner et al devised a concept of decentralized security IS that supports privacy of collaborating partners.…”
Section: Related Workmentioning
confidence: 99%