skip to main content
10.1145/2663876acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
WISCS '14: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security Scottsdale Arizona USA 3 November 2014
ISBN:
978-1-4503-3151-7
Published:
03 November 2014
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

It is my great pleasure to welcome you to the 2014 ACM Workshop on Information Sharing and Collaborative Security -- WISCS 2014. The mission of this new workshop is to advance the scientific foundations for sharing threat and security-related data among organizations. There is increasing evidence that collaboratively organizations can defend themselves against cyber-attacks more effectively. Thus improving sharing capabilities has become an important topic in the security community that is inspiring exciting research by the academic community, commercial offerings by security vendors and novel studies by the public policy community on how to address the privacy, civil liberties and liability concerns that arise. This year's workshop aims to be a premier forum for the presentation of research results and practical case studies in collaborative security, privacy and confidentiality, as well as legal and policy issues.

The call for papers attracted submissions from Asia, Europe, and the United States. The program committee reviewed 18 submissions of which 9 were accepted as full papers. They cover a variety of topics including the design of information sharing infrastructures, cryptographic support for privacy-preserving sharing as well as the sharing of network and application data. The program also includes an opening keynote Why Collaborate? by Dr. Paul Vixie, CEO of Farsight Security that will surely stimulate interesting discussions. Dr. Vixie has been a pioneer of sharing DNS information for security purposes and was recently introduced into the Internet Hall of Fame as an innovator for his fundamental contributions to the DNS system.

Skip Table Of Content Section
SESSION: Keynote Address
keynote
Why Collaborate?

The Internet is defined and designed to be the ultimate Distributed System, and it has created powers of art, of commerce, of education, and science not even dreamed of by fantasy or science fiction as little as a century ago. Like all tools, the ...

SESSION: Sharing Network and Application Data
research-article
PrefiSec: A Distributed Alliance Framework for Collaborative BGP Monitoring and Prefix-based Security

This paper presents the design and data-driven overhead analysis of PrefiSec, a distributed framework that helps collaborating organizations to effectively maintain and share network information in the fight against miscreants. PrefiSec is a novel ...

research-article
Critter: Content-Rich Traffic Trace Repository

Access to current application and network data is vital to cybersecurity and networking research. Intrusion detection, steganography, traffic camouflaging, traffic classification and modeling all benefit from real-world data. Such data provides training,...

SESSION: Privacy-preserving Protocols
research-article
Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing

In a data-driven economy that struggles to cope with the volume and diversity of information, data quality assessment has become a necessary precursor to data analytics. Real-world data often contains inconsistencies, conflicts and errors. Such dirty ...

research-article
Attribute Based Search in Encrypted Data: ABSE

Searchable encryption enables users to delegate search functionalities to third-parties without giving them the ability to decrypt. Existing schemes assume that the sender knows the identity of the receiver. In this paper we relax this assumption by ...

SESSION: Foundations of Information Sharing
research-article
Bilateral Analysis of Information Sharing Efforts: Determining the Expected Effectiveness of Information Sharing Efforts

Cyber security and threat information sharing efforts involve a variety of groups of practicioners and stakeholders. This paper presents a methodology for analyzing information sharing efforts, to determine whether and how well the efforts will succeed. ...

research-article
Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies

The cyber threat intelligence information exchange ecosystem is a holistic approach to the automated sharing of threat intelligence. For automation to succeed, it must handle tomorrow's attacks, not just yesterday's. There are numerous ontologies that ...

research-article
On the Design of a Cyber Security Data Sharing System

The need for more fluent information sharing has been recognized for years as a major requirement by the cyber security community. Information sharing at present is mostly a slow, inefficient, and manual process that in many cases uses non-structured ...

SESSION: Sharing Data in Cloud Environments and for Android applications
research-article
Data Model for Android Package Information and Its Application to Risk Analysis System

Android Package (APK) analysis is one of the basic processes for risk analysis of Androids. It requires huge amounts of APK files and related information to produce meaningful output, but individual organizations collecting and accumulating these in ...

research-article
Secure Information and Resource Sharing in Cloud Infrastructure as a Service

Cloud infrastructure as a service (IaaS) refers to virtualized IT resources such as compute, storage and networking, offered as a service by a cloud service provider on demand to its customers (equivalently tenants). IaaS is a fast-maturing cloud ...

Contributors
  • Arizona State University
  • Intertrust Technologies Corporation
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

WISCS '14 Paper Acceptance Rate9of18submissions,50%Overall Acceptance Rate23of58submissions,40%
YearSubmittedAcceptedRate
WISCS '1624833%
WISCS '1516638%
WISCS '1418950%
Overall582340%