Pseudonymizing audit data for privacy respecting misuse detection:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
2005
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Dortmund, Univ., Diss., 2006 |
Beschreibung: | 407 S. graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021576058 | ||
003 | DE-604 | ||
005 | 20070522 | ||
007 | t | ||
008 | 060510s2005 d||| m||| 00||| eng d | ||
035 | |a (OCoLC)162240247 | ||
035 | |a (DE-599)BVBBV021576058 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-355 |a DE-12 |a DE-29T | ||
100 | 1 | |a Flegel, Ulrich |e Verfasser |4 aut | |
245 | 1 | 0 | |a Pseudonymizing audit data for privacy respecting misuse detection |c von Ulrich Flegel |
264 | 1 | |c 2005 | |
300 | |a 407 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Dortmund, Univ., Diss., 2006 | ||
650 | 0 | 7 | |a Mikroform |0 (DE-588)4039216-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymisierung |0 (DE-588)4139362-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computer-Missbrauchversicherung |0 (DE-588)4129259-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Computer-Missbrauchversicherung |0 (DE-588)4129259-5 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Mikroform |0 (DE-588)4039216-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 1 | 1 | |a Anonymisierung |0 (DE-588)4139362-4 |D s |
689 | 1 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014791804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014791804 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135345226252288 |
---|---|
adam_text | PSEUDONYMIZING AUDIT DATA FOR PRIVACY RESPECTING MISUSE DETECTION
DISSERTATION ZUR ERLANGUNG DES GRADES EINES DOKTORS DER
NATURWISSENSCHAFTEN DER UNIVERSITAT DORTMUND AM FACHBEREICH INFORMATIK
VON ULRICH FLEGEL UUV DORTMUND 2005 ULB DARMSTADT
ILLLLLLLLLLLLLLLLLLLLLLL 16321311 CONTENTS I. INTRODUCTION AND
BACKGROUND 19 1. INTRODUCTION 21 1.1. MOTIVATION 21 1.2. THESIS
STATEMENT AND CONTRIBUTIONS 23 1.3. OVERVIEW 26 1.4. RELATED GRANTS,
PUBLICATIONS AND EVENTS 29 2. AUTHORIZATIONS 33 2.1. PROM THE REAL WORLD
TO THE DIGITAL WORLD 33 2.2. VISITING THE ZOO * EXEMPLARY REAL-WORLD
AUTHORIZATIONS 33 2.3. TRUST AND CONTROL 35 2.4. REAL-WORLD COUNTERPARTS
IN THE DIGITAL WORLD 35 3. AN ARCHITECTURAL MODEL FOR SECURE
AUTHORIZATIONS 37 3.1. ENTITIES AND PROPERTIES 38 3.2. CERTIFICATION AND
AUTHORIZATION 38 3.3. PROPERTY STATEMENTS 39 3.4. ARCHITECTURES AND
CONTROL REQUIREMENTS 42 3.5. EXEMPLARY ARCHITECTURES 48 4. TRADITIONAL
SECURITY OBJECTIVES 51 4.1. EXPECTATIONS OF USERS 51 4.2. REQUIREMENTS
OF PROVIDERS 52 4.3. SURVEILLANCE USING AUDIT DATA 53 5. PERSONAL DATA
PROTECTION OBJECTIVES 55 5.1. WHY PERSONAL DATA PROTECTION? 55 5.2.
DISTINCTION FROM TRADITIONAL SECURITY OBJECTIVES 56 5.3. EXPECTATIONS OF
USERS 57 5.4. REQUIREMENTS OF PERTINENT LEGISLATION 57 5.5. NECESSITY OF
TECHNICAL ENFORCEMENT 62 CONTENTS 5.6. PRINCIPLES OF TECHNICAL
IMPLEMENTATION 63 5.7. DUALITY OF SAFEGUARDS 65 6. THE CHALLENGE:
TECHNICAL ENFORCEMENT OF MULTILATERAL SECURITY 69 6.1. A LAW-DRIVEN
APPROACH USING PSEUDONYMS 70 7. PSEUDONYMS * A TECHNICAL POINT OF VIEW
73 7.1. DEFINITION OF TERMS 73 7.2. CONTROLLED DISCLOSURE 74 7.3.
LINKABILITY AND UNCONTROLLED DISCLOSURE 79 7.4. FURTHER PROPERTIES 80
7.5. UNOBSERVABILITY OF EVENTS 81 8. AN ARCHITECTURAL MODEL FOR
PSEUDONYMOUS AND SECURE AUTHORIZATIONS 83 8.1. PSEUDONYMOUS PROPERTY
STATEMENTS 83 8.2. ROLE OF THE ATTACKER MODEL FOR CONTROL REQUIREMENTS
85 8.3. DOMAIN OF APPLICATION AND CORRESPONDING ATTACKER MODEL 86 8.4.
ARCHITECTURES AND CONTROL REQUIREMENTS 87 9. COMPARING ARCHITECTURES AND
LOOSELY RELATED WORK 93 9.1. CRITERIA AND COMPARISON 93 9.2. EXEMPLARY
ARCHITECTURES FOR PSEUDONYMOUS AUTHORIZATIONS 96 9.3. DISTINCTION FROM
LOOSELY RELATED WORK 103 10. AUDIT DATA PSEUDONYMIZATION AND CLOSELY
RELATED WORK 105 10.1. SPECIFIC REQUIREMENTS OF AUDIT DATA
PSEUDONYMIZATION 105 10.2. CRITERIA AND COMPARISON 106 10.3. EXEMPLARY
APPROACHES TO AUDIT DATA PSEUDONYMIZATION 110 10.4. DISTINCTION FROM
CLOSELY RELATED WORK 115 11. CONTRIBUTIONS IN PART I 117 11. SET-BASED
APPROACH 119 12. REQUIREMENTS, ASSUMPTIONS AND TRUST MODEL 121 13.
MODELING CONDITIONS FOR TECHNICAL PURPOSE BINDING 127 13.1. SET-BASED
MODEL OF DISCLOSURE CONDITIONS 127 13.2. A PRIORI KNOWLEDGE 130 13.3.
DECISION STRUCTURES 131 CONTENTS 14. CRYPTOGRAPHIC ENFORCEMENT OF
DISCLOSURE CONDITIONS 133 14.1. PSEUDONYMITY-LAYER DATA 133 14.2.
PROTECTING IDENTITIES IN THE PSEUDONYM MAPPING 134 14.3. PROTECTING
SECRETS IN THE PSEUDONYMITY-LAYER 136 14.4. ADAPTED APPLICATION OF
SHAMIR S THRESHOLD SCHEME 136 15. THE MISMATCH PROBLEM 139 15.1.
DEFINITION OF MISMATCHES 139 15.2. PROBABILITY OF MISMATCHES 140 15.3.
TACKLING THE MISMATCH PROBLEM 141 16.OPERATIONAL PSEUDONYMIZATION AND
PSEUDONYM DISCLOSURE 145 16.1. INITIALIZATION 148 16.2. PSEUDONYMIZATION
148 16.3. PSEUDONYM DISCLOSURE 149 17. EXTENSIONS 153 17.1. ATTACKER
MODEL 153 17.2. COARSENING THE NUMBER OF POTENTIAL ACTORS 155 17.3.
USING PSEUDONYM MAPPING ENTRIES AS LINKABILITY LABELS 156 17.4.
SIGNIFICANCE OF REPEATED OBSERVATIONS 157 17.5. RECONCILING OBSERVATIONS
159 17.6. ORGANIZATIONAL PURPOSE BINDING 162 17.7. FUTURE EXTENSIONS 164
18. CONTRIBUTIONS IN PART II 167 III. APPLICATION TO UNIX AUDIT DATA 169
19. UNIX AUDIT DATA 171 19.1. UNIX AUDIT ARCHITECTURE 171 19.2.
SELECTION OF SYSLOG 173 X.SYDOG 175 20.1. TYPICAL SYSLOG AUDIT DATA 175
* 20.2. SYSLOG AUDIT DATA PROCESSING 177 20.3. EMBEDDING AUDIT DATA
PSEUDONYMIZERS 178 21. INSTANTIATING THE SET-BASED APPROACH FOR
SYSLOG-STYLE AUDIT DATA 181 * 21.1. LOCATING IDENTIFYING FEATURES IN
APPLICATION-LAYER DATA 181 21.2. GENERATING PSEUDONYMITY-LAYER DATA FOR
PSEUDONYM DISCLOSURE . . . 183 CONTENTS 21.3. TRUST MODEL AND RELATED
ASPECTS 187 21.4. ARCHITECTURE 188 22. IMPLEMENTATION: PSEUDO/CORE 193
22.1. SOFTWARE 193 22.2. DEPLOYMENT 194 22.3. CONFIGURATION 196 22.4.
FUNCTIONALITY 199 23.CONTRIBUTIONS IN PART III 203 IV. EVALUATION 205
24. APES: ANONYMITY AND PRIVACY IN ELECTRONIC SERVICES 207 24.1. PROJECT
OVERVIEW 207 24.2. BASIC BUILDING BLOCKS FOR ANONYMIT Y 208 24.3. DESIGN
APPROACH 209 25. EVALUATING OUR DESIGN USING BASIC BUILDING BLOCKS FOR
ANONYMITY 213 25.1. MAPPING OUR DESIGN TO BUILDING BLOCKS 213 25.2.
CONSIDERING BUILDING BLOCKS FOR IMPROVED DESIGN 217 25.3. DESIGN
EVALUATION RESULTS 221 26. EVALUATING THE PERFORMANCE OF THE
IMPLEMENTATION 223 26.1. PERFORMANCE OF THE CRYPTOGRAPHIC PRIMITIVES 224
26.2. PERFORMANCE OF THE PSEUDONYMIZER 225 26.3. EXEMPLARY PERFORMANCE
REQUIREMENTS 229 27. CONTRIBUTIONS IN PART IV 233 V. REFINEMENT OF
MISUSE SCENARIO MODELS 235 28. MOTIVATING MODEL REFINEMENTS 237 28.1.
COARSE-GRAINED DISCLOSURE CONTEXT 237 28.2. EXCESS PSEUDONYM LINKABILITY
238 29. MODELS OF MISUSE SCENARIOS 241 29.1. RELATED WORK ON SIGNATURE
LANGUAGES 243 29.2. SEMANTIC REQUIREMENTS 244 29.3. MODELING FRAMEWORK
248 10 CONTENTS 29.4. LIMITING THE FRAMEWORK FOR PSEUDONYMIZATION 261
30. PSEUDONYMIZATION BASED ON SERIAL SIGNATURE-NETS 269 31. PSEUDONYM
LINKABILITY 273 31.1. EXTRACTING LINKABILITY REQUIREMENTS FROM SERIAL
SIGNATURE-NETS . . . 275 31.2. PRIMITIVES FOR TECHNICAL PURPOSE BINDING
OF LINKABILITY 279 31.3. OPERATION OF THE PSEUDONYMIZER 281 31.4.
OPERATION OF THE ANALYSIS ENGINE 285 32. PSEUDONYM DISCLOSURE 287 32.1.
EXTRACTING DISCLOSURE REQUIREMENTS FROM SERIAL SIGNATURE-NETS . . . 289
32.2. PRIMITIVES FOR TECHNICAL PURPOSE BINDING OF DISCLOSURE 293 32.3.
EXTRACTING THRESHOLD SCHEME DESCRIPTIONS FROM SERIAL SIGNATURE-NETS 301
32.4. PSEUDONYMITY-LAYER DATA 307 32.5. OPERATION OF THE PSEUDONYMIZER
311 32.6. OPERATION OF THE ANALYSIS ENGINE 318 33. FUTURE DIRECTIONS 325
33.1. USABILITY AND APPLICABILITY 325 33.2. PERFORMANCE 326 33.3.
SECURITY OF PSEUDONYMIZATION 327 33.4. EXTENSIONS 328 33.5.
UNOBSERVABILITY 329 34. CONTRIBUTIONS IN PART V 333 SUMMARY 337
BIBLIOGRAPHY 341 A. THRESHOLD SCHEMES FOR CRYPTOGRAPHIC SECRET SHARING
361 A.L. SHAMIR 361 A.2. KARNIN, GREENE AND HELLMAN 363 B. EXAMPLE
APPLICATIONS OF PSEUDO/CORE 365 B.I. WEB-BASED FRONT-END 367 B.2. LINUX
USER ACCOUNT LOG-IN 370 B.3. ELECTRONIC CASH 378 B.4. WEB SERVER 388
B.5. ANONYMOUS WEB BROWSING 396 11 CONTENTS B.6. NETWORK MONITORING TOOL
TCPLOG 403 12
|
adam_txt |
PSEUDONYMIZING AUDIT DATA FOR PRIVACY RESPECTING MISUSE DETECTION
DISSERTATION ZUR ERLANGUNG DES GRADES EINES DOKTORS DER
NATURWISSENSCHAFTEN DER UNIVERSITAT DORTMUND AM FACHBEREICH INFORMATIK
VON ULRICH FLEGEL UUV DORTMUND 2005 ULB DARMSTADT
ILLLLLLLLLLLLLLLLLLLLLLL 16321311 CONTENTS I. INTRODUCTION AND
BACKGROUND 19 1. INTRODUCTION 21 1.1. MOTIVATION 21 1.2. THESIS
STATEMENT AND CONTRIBUTIONS 23 1.3. OVERVIEW 26 1.4. RELATED GRANTS,
PUBLICATIONS AND EVENTS 29 2. AUTHORIZATIONS 33 2.1. PROM THE REAL WORLD
TO THE DIGITAL WORLD 33 2.2. VISITING THE ZOO * EXEMPLARY REAL-WORLD
AUTHORIZATIONS 33 2.3. TRUST AND CONTROL 35 2.4. REAL-WORLD COUNTERPARTS
IN THE DIGITAL WORLD 35 3. AN ARCHITECTURAL MODEL FOR SECURE
AUTHORIZATIONS 37 3.1. ENTITIES AND PROPERTIES 38 3.2. CERTIFICATION AND
AUTHORIZATION 38 3.3. PROPERTY STATEMENTS 39 3.4. ARCHITECTURES AND
CONTROL REQUIREMENTS 42 3.5. EXEMPLARY ARCHITECTURES 48 4. TRADITIONAL
SECURITY OBJECTIVES 51 4.1. EXPECTATIONS OF USERS 51 4.2. REQUIREMENTS
OF PROVIDERS 52 4.3. SURVEILLANCE USING AUDIT DATA 53 5. PERSONAL DATA
PROTECTION OBJECTIVES 55 5.1. WHY PERSONAL DATA PROTECTION? 55 5.2.
DISTINCTION FROM TRADITIONAL SECURITY OBJECTIVES 56 5.3. EXPECTATIONS OF
USERS 57 5.4. REQUIREMENTS OF PERTINENT LEGISLATION 57 5.5. NECESSITY OF
TECHNICAL ENFORCEMENT 62 CONTENTS 5.6. PRINCIPLES OF TECHNICAL
IMPLEMENTATION 63 5.7. DUALITY OF SAFEGUARDS 65 6. THE CHALLENGE:
TECHNICAL ENFORCEMENT OF MULTILATERAL SECURITY 69 6.1. A LAW-DRIVEN
APPROACH USING PSEUDONYMS 70 7. PSEUDONYMS * A TECHNICAL POINT OF VIEW
73 7.1. DEFINITION OF TERMS 73 7.2. CONTROLLED DISCLOSURE 74 7.3.
LINKABILITY AND UNCONTROLLED DISCLOSURE 79 7.4. FURTHER PROPERTIES 80
7.5. UNOBSERVABILITY OF EVENTS 81 8. AN ARCHITECTURAL MODEL FOR
PSEUDONYMOUS AND SECURE AUTHORIZATIONS 83 8.1. PSEUDONYMOUS PROPERTY
STATEMENTS 83 8.2. ROLE OF THE ATTACKER MODEL FOR CONTROL REQUIREMENTS
85 8.3. DOMAIN OF APPLICATION AND CORRESPONDING ATTACKER MODEL 86 8.4.
ARCHITECTURES AND CONTROL REQUIREMENTS 87 9. COMPARING ARCHITECTURES AND
LOOSELY RELATED WORK 93 9.1. CRITERIA AND COMPARISON 93 9.2. EXEMPLARY
ARCHITECTURES FOR PSEUDONYMOUS AUTHORIZATIONS 96 9.3. DISTINCTION FROM
LOOSELY RELATED WORK 103 10. AUDIT DATA PSEUDONYMIZATION AND CLOSELY
RELATED WORK 105 10.1. SPECIFIC REQUIREMENTS OF AUDIT DATA
PSEUDONYMIZATION 105 10.2. CRITERIA AND COMPARISON 106 10.3. EXEMPLARY
APPROACHES TO AUDIT DATA PSEUDONYMIZATION 110 10.4. DISTINCTION FROM
CLOSELY RELATED WORK 115 11. CONTRIBUTIONS IN PART I 117 11. SET-BASED
APPROACH 119 12. REQUIREMENTS, ASSUMPTIONS AND TRUST MODEL 121 13.
MODELING CONDITIONS FOR TECHNICAL PURPOSE BINDING 127 13.1. SET-BASED
MODEL OF DISCLOSURE CONDITIONS 127 13.2. A PRIORI KNOWLEDGE 130 13.3.
DECISION STRUCTURES 131 CONTENTS 14. CRYPTOGRAPHIC ENFORCEMENT OF
DISCLOSURE CONDITIONS 133 14.1. PSEUDONYMITY-LAYER DATA 133 14.2.
PROTECTING IDENTITIES IN THE PSEUDONYM MAPPING 134 14.3. PROTECTING
SECRETS IN THE PSEUDONYMITY-LAYER 136 14.4. ADAPTED APPLICATION OF
SHAMIR'S THRESHOLD SCHEME 136 15. THE MISMATCH PROBLEM 139 15.1.
DEFINITION OF MISMATCHES 139 15.2. PROBABILITY OF MISMATCHES 140 15.3.
TACKLING THE MISMATCH PROBLEM 141 16.OPERATIONAL PSEUDONYMIZATION AND
PSEUDONYM DISCLOSURE 145 16.1. INITIALIZATION 148 16.2. PSEUDONYMIZATION
148 16.3. PSEUDONYM DISCLOSURE 149 17. EXTENSIONS 153 17.1. ATTACKER
MODEL 153 17.2. COARSENING THE NUMBER OF POTENTIAL ACTORS 155 17.3.
USING PSEUDONYM MAPPING ENTRIES AS LINKABILITY LABELS 156 17.4.
SIGNIFICANCE OF REPEATED OBSERVATIONS 157 17.5. RECONCILING OBSERVATIONS
159 17.6. ORGANIZATIONAL PURPOSE BINDING 162 17.7. FUTURE EXTENSIONS 164
18. CONTRIBUTIONS IN PART II 167 III. APPLICATION TO UNIX AUDIT DATA 169
19. UNIX AUDIT DATA 171 19.1. UNIX AUDIT ARCHITECTURE 171 19.2.
SELECTION OF SYSLOG 173 X.SYDOG 175 20.1. TYPICAL SYSLOG AUDIT DATA 175
* 20.2. SYSLOG AUDIT DATA PROCESSING 177 20.3. EMBEDDING AUDIT DATA
PSEUDONYMIZERS 178 21. INSTANTIATING THE SET-BASED APPROACH FOR
SYSLOG-STYLE AUDIT DATA 181 * 21.1. LOCATING IDENTIFYING FEATURES IN
APPLICATION-LAYER DATA 181 21.2. GENERATING PSEUDONYMITY-LAYER DATA FOR
PSEUDONYM DISCLOSURE . . . 183 CONTENTS 21.3. TRUST MODEL AND RELATED
ASPECTS 187 21.4. ARCHITECTURE 188 22. IMPLEMENTATION: PSEUDO/CORE 193
22.1. SOFTWARE 193 22.2. DEPLOYMENT 194 22.3. CONFIGURATION 196 22.4.
FUNCTIONALITY 199 23.CONTRIBUTIONS IN PART III 203 IV. EVALUATION 205
24. APES: ANONYMITY AND PRIVACY IN ELECTRONIC SERVICES 207 24.1. PROJECT
OVERVIEW 207 24.2. BASIC BUILDING BLOCKS FOR ANONYMIT Y 208 24.3. DESIGN
APPROACH 209 25. EVALUATING OUR DESIGN USING BASIC BUILDING BLOCKS FOR
ANONYMITY 213 25.1. MAPPING OUR DESIGN TO BUILDING BLOCKS 213 25.2.
CONSIDERING BUILDING BLOCKS FOR IMPROVED DESIGN 217 25.3. DESIGN
EVALUATION RESULTS 221 26. EVALUATING THE PERFORMANCE OF THE
IMPLEMENTATION 223 26.1. PERFORMANCE OF THE CRYPTOGRAPHIC PRIMITIVES 224
26.2. PERFORMANCE OF THE PSEUDONYMIZER 225 26.3. EXEMPLARY PERFORMANCE
REQUIREMENTS 229 27. CONTRIBUTIONS IN PART IV 233 V. REFINEMENT OF
MISUSE SCENARIO MODELS 235 28. MOTIVATING MODEL REFINEMENTS 237 28.1.
COARSE-GRAINED DISCLOSURE CONTEXT 237 28.2. EXCESS PSEUDONYM LINKABILITY
238 29. MODELS OF MISUSE SCENARIOS 241 29.1. RELATED WORK ON SIGNATURE
LANGUAGES 243 29.2. SEMANTIC REQUIREMENTS 244 29.3. MODELING FRAMEWORK
248 10 CONTENTS 29.4. LIMITING THE FRAMEWORK FOR PSEUDONYMIZATION 261
30. PSEUDONYMIZATION BASED ON SERIAL SIGNATURE-NETS 269 31. PSEUDONYM
LINKABILITY 273 31.1. EXTRACTING LINKABILITY REQUIREMENTS FROM SERIAL
SIGNATURE-NETS . . . 275 31.2. PRIMITIVES FOR TECHNICAL PURPOSE BINDING
OF LINKABILITY 279 31.3. OPERATION OF THE PSEUDONYMIZER 281 31.4.
OPERATION OF THE ANALYSIS ENGINE 285 32. PSEUDONYM DISCLOSURE 287 32.1.
EXTRACTING DISCLOSURE REQUIREMENTS FROM SERIAL SIGNATURE-NETS . . . 289
32.2. PRIMITIVES FOR TECHNICAL PURPOSE BINDING OF DISCLOSURE 293 32.3.
EXTRACTING THRESHOLD SCHEME DESCRIPTIONS FROM SERIAL SIGNATURE-NETS 301
32.4. PSEUDONYMITY-LAYER DATA 307 32.5. OPERATION OF THE PSEUDONYMIZER
311 32.6. OPERATION OF THE ANALYSIS ENGINE 318 33. FUTURE DIRECTIONS 325
33.1. USABILITY AND APPLICABILITY 325 33.2. PERFORMANCE 326 33.3.
SECURITY OF PSEUDONYMIZATION 327 33.4. EXTENSIONS 328 33.5.
UNOBSERVABILITY 329 34. CONTRIBUTIONS IN PART V 333 SUMMARY 337
BIBLIOGRAPHY 341 A. THRESHOLD SCHEMES FOR CRYPTOGRAPHIC SECRET SHARING
361 A.L. SHAMIR 361 A.2. KARNIN, GREENE AND HELLMAN 363 B. EXAMPLE
APPLICATIONS OF PSEUDO/CORE 365 B.I. WEB-BASED FRONT-END 367 B.2. LINUX
USER ACCOUNT LOG-IN 370 B.3. ELECTRONIC CASH 378 B.4. WEB SERVER 388
B.5. ANONYMOUS WEB BROWSING 396 11 CONTENTS B.6. NETWORK MONITORING TOOL
TCPLOG 403 12 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Flegel, Ulrich |
author_facet | Flegel, Ulrich |
author_role | aut |
author_sort | Flegel, Ulrich |
author_variant | u f uf |
building | Verbundindex |
bvnumber | BV021576058 |
ctrlnum | (OCoLC)162240247 (DE-599)BVBBV021576058 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01922nam a2200457 c 4500</leader><controlfield tag="001">BV021576058</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070522 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060510s2005 d||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162240247</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021576058</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Flegel, Ulrich</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pseudonymizing audit data for privacy respecting misuse detection</subfield><subfield code="c">von Ulrich Flegel</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">407 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Dortmund, Univ., Diss., 2006</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mikroform</subfield><subfield code="0">(DE-588)4039216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer-Missbrauchversicherung</subfield><subfield code="0">(DE-588)4129259-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computer-Missbrauchversicherung</subfield><subfield code="0">(DE-588)4129259-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Mikroform</subfield><subfield code="0">(DE-588)4039216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014791804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014791804</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV021576058 |
illustrated | Illustrated |
index_date | 2024-07-02T14:40:06Z |
indexdate | 2024-07-09T20:39:02Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014791804 |
oclc_num | 162240247 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-355 DE-BY-UBR DE-12 DE-29T |
owner_facet | DE-91 DE-BY-TUM DE-355 DE-BY-UBR DE-12 DE-29T |
physical | 407 S. graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
record_format | marc |
spelling | Flegel, Ulrich Verfasser aut Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel 2005 407 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Dortmund, Univ., Diss., 2006 Mikroform (DE-588)4039216-8 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Anonymisierung (DE-588)4139362-4 gnd rswk-swf Computer-Missbrauchversicherung (DE-588)4129259-5 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Computer-Missbrauchversicherung (DE-588)4129259-5 s Privatsphäre (DE-588)4123980-5 s Mikroform (DE-588)4039216-8 s DE-604 Eindringerkennung (DE-588)4706627-1 s Anonymisierung (DE-588)4139362-4 s Datenschutz (DE-588)4011134-9 s 1\p DE-604 HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014791804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Flegel, Ulrich Pseudonymizing audit data for privacy respecting misuse detection Mikroform (DE-588)4039216-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Datenschutz (DE-588)4011134-9 gnd Anonymisierung (DE-588)4139362-4 gnd Computer-Missbrauchversicherung (DE-588)4129259-5 gnd |
subject_GND | (DE-588)4039216-8 (DE-588)4123980-5 (DE-588)4706627-1 (DE-588)4011134-9 (DE-588)4139362-4 (DE-588)4129259-5 (DE-588)4113937-9 |
title | Pseudonymizing audit data for privacy respecting misuse detection |
title_auth | Pseudonymizing audit data for privacy respecting misuse detection |
title_exact_search | Pseudonymizing audit data for privacy respecting misuse detection |
title_exact_search_txtP | Pseudonymizing audit data for privacy respecting misuse detection |
title_full | Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel |
title_fullStr | Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel |
title_full_unstemmed | Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel |
title_short | Pseudonymizing audit data for privacy respecting misuse detection |
title_sort | pseudonymizing audit data for privacy respecting misuse detection |
topic | Mikroform (DE-588)4039216-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Datenschutz (DE-588)4011134-9 gnd Anonymisierung (DE-588)4139362-4 gnd Computer-Missbrauchversicherung (DE-588)4129259-5 gnd |
topic_facet | Mikroform Privatsphäre Eindringerkennung Datenschutz Anonymisierung Computer-Missbrauchversicherung Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014791804&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT flegelulrich pseudonymizingauditdataforprivacyrespectingmisusedetection |