The 2nd workshop on active internet measurements (AIMS-2) report
ACM SIGCOMM Computer Communication Review
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
The 3rd workshop on active internet measurements (AIMS-3) report
ACM SIGCOMM Computer Communication Review
Conducting an ethical study of web traffic
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Workshop report: darkspace and unsolicited traffic analysis (DUST 2012)
ACM SIGCOMM Computer Communication Review
Workshop on internet economics (WIE2012) report
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
The current reluctance to share systems and network data derives from gaps in the law, commercial pressures, and evolving considerations of threat models and ethical behavior. Internet research stakeholders have an opportunity to tip the risk scales in favor of more protected data sharing by proactively implementing appropriate privacy risk management. The privacy-sensitive sharing (PS2) framework integrates privacy-enhancing technologies with a policy framework. The authors evaluate this framework along two primary criteria: how well the policies and techniques address privacy risks, and how well policies and techniques achieve utility objectives. A case study applies the framework to enable network operational data sharing for cybersecurity RD.