Towards Privacy-Preserving Sharing of Cyber Threat Intelligence for Effective Response and Recovery

被引:0
|
作者
Nitz, Lasse [1 ,2 ]
Gurabi, Mehdi Akbari [1 ,2 ]
Mandal, Avikarsha [1 ,2 ]
Heitmann, Benjamin [1 ,2 ]
机构
[1] Fraunhofer FIT, St Augustin, Germany
[2] Fraunhofer Inst Appl Informat Technol FIT, St Augustin, Germany
来源
ERCIM NEWS | 2021年 / 126期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Many European organisations suffer from a lack of sufficient resources to provide satisfactory and timely response and recovery (R&R) actions when targeted by cyber-attacks. R&R capabilities can be significantly improved through sharing of information related to incident detection and handling. In this context, privacy-preserving technologies can enable data sharing, while protecting privacy- and security-critical information. The technologies to achieve this are being developed and evaluated in the SAPPAN project.
引用
收藏
页码:33 / 34
页数:2
相关论文
共 50 条
  • [31] Towards Distributed Privacy-Preserving Prediction
    Lyu, Lingjuan
    Law, Yee Wei
    Ng, Kee Siong
    Xue, Shibei
    Zhao, Jun
    Yang, Mengmeng
    Liu, Lei
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 4179 - 4184
  • [32] Towards practical privacy-preserving protocols
    Demmler, Daniel
    [J]. IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53
  • [33] Privacy-Preserving Sharing of Sensitive Information Introduction
    Stolfo, Salvatore J.
    Tsudik, Gene
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (04) : 16 - 17
  • [34] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    [J]. Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [35] Privacy-preserving Job Scheduler for GPU Sharing
    Ray, Aritra
    Lafata, Kyle
    Zhang, Zhaobo
    Xiong, Ying
    Chakrabarty, Krishnendu
    [J]. 2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 337 - 339
  • [36] An efficient and privacy-preserving location sharing mechanism
    Shen, Nan
    Yang, Jun
    Yuan, Ke
    Fu, Chuan
    Jia, Chunfu
    [J]. COMPUTER STANDARDS & INTERFACES, 2016, 44 : 102 - 109
  • [37] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [38] Privacy-preserving photo sharing based on blockchain
    Pfister, Pablo
    Ebrahimi, Touradj
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XLIII, 2020, 11510
  • [39] Privacy-preserving sharing and correlation of security alerts
    Lincoln, P
    Porras, P
    Shmatikov, V
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 239 - 254
  • [40] Privacy-preserving logistic regression with secret sharing
    Ghavamipour, Ali Reza
    Turkmen, Fatih
    Jiang, Xiaoqian
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2022, 22 (01)