Pseudonymizing audit data for privacy respecting misuse detection:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
2005 [erschienen] 2006
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 407 S. Ill., graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV024611631 | ||
003 | DE-604 | ||
005 | 20090910 | ||
007 | t | ||
008 | 090924s2006 ad|| m||| 00||| eng d | ||
015 | |a 06,H06,0018 |2 dnb | ||
016 | 7 | |a 979324793 |2 DE-101 | |
035 | |a (OCoLC)255001537 | ||
035 | |a (DE-599)BVBBV024611631 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-188 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Flegel, Ulrich |e Verfasser |4 aut | |
245 | 1 | 0 | |a Pseudonymizing audit data for privacy respecting misuse detection |c von Ulrich Flegel |
264 | 1 | |c 2005 [erschienen] 2006 | |
300 | |a 407 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |a Dortmund, Univ., Diss., 2006 | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymisierung |0 (DE-588)4139362-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computer-Missbrauchversicherung |0 (DE-588)4129259-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mikroform |0 (DE-588)4039216-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 1 | |a Anonymisierung |0 (DE-588)4139362-4 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-188 | |
689 | 1 | 0 | |a Computer-Missbrauchversicherung |0 (DE-588)4129259-5 |D s |
689 | 1 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 2 | |a Mikroform |0 (DE-588)4039216-8 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018584304&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018584304 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804140628708163584 |
---|---|
adam_text | PSEUDONYMIZING AUDIT DATA
FOR
PRIVACY RESPECTING MISUSE DETECTION
DISSERTATION
ZUR ERLANGUNG DES GRADES EINES
DOKTORS DER NATURWISSENSCHAFTEN
DER UNIVERSITAT DORTMUND
AM FACHBEREICH INFORMATIK
VON
ULRICH FLEGEL
UUV
DORTMUND
2005
ULB DARMSTADT
ILLLLLLLLLLLLLLLLLLLLLLL
16321311
CONTENTS
I. INTRODUCTION AND BACKGROUND 19
1. INTRODUCTION 21
1.1. MOTIVATION 21
1.2. THESIS STATEMENT AND CONTRIBUTIONS 23
1.3. OVERVIEW 26
1.4. RELATED GRANTS, PUBLICATIONS AND EVENTS 29
2. AUTHORIZATIONS 33
2.1. PROM THE REAL WORLD TO THE DIGITAL WORLD 33
2.2. VISITING THE ZOO * EXEMPLARY REAL-WORLD AUTHORIZATIONS 33
2.3. TRUST AND CONTROL 35
2.4. REAL-WORLD COUNTERPARTS IN THE DIGITAL WORLD 35
3. AN ARCHITECTURAL MODEL FOR SECURE AUTHORIZATIONS 37
3.1. ENTITIES AND PROPERTIES 38
3.2. CERTIFICATION AND AUTHORIZATION 38
3.3. PROPERTY STATEMENTS 39
3.4. ARCHITECTURES AND CONTROL REQUIREMENTS 42
3.5. EXEMPLARY ARCHITECTURES 48
4. TRADITIONAL SECURITY OBJECTIVES 51
4.1. EXPECTATIONS OF USERS 51
4.2. REQUIREMENTS OF PROVIDERS 52
4.3. SURVEILLANCE USING AUDIT DATA 53
5. PERSONAL DATA PROTECTION OBJECTIVES 55
5.1. WHY PERSONAL DATA PROTECTION? 55
5.2. DISTINCTION FROM TRADITIONAL SECURITY OBJECTIVES 56
5.3. EXPECTATIONS OF USERS 57
5.4. REQUIREMENTS OF PERTINENT LEGISLATION 57
5.5. NECESSITY OF TECHNICAL ENFORCEMENT 62
CONTENTS
5.6. PRINCIPLES OF TECHNICAL IMPLEMENTATION 63
5.7. DUALITY OF SAFEGUARDS 65
6. THE CHALLENGE: TECHNICAL ENFORCEMENT OF MULTILATERAL SECURITY 69
6.1. A LAW-DRIVEN APPROACH USING PSEUDONYMS 70
7. PSEUDONYMS * A TECHNICAL POINT OF VIEW 73
7.1. DEFINITION OF TERMS 73
7.2. CONTROLLED DISCLOSURE 74
7.3. LINKABILITY AND UNCONTROLLED DISCLOSURE 79
7.4. FURTHER PROPERTIES 80
7.5. UNOBSERVABILITY OF EVENTS 81
8. AN ARCHITECTURAL MODEL FOR PSEUDONYMOUS AND SECURE AUTHORIZATIONS 83
8.1. PSEUDONYMOUS PROPERTY STATEMENTS 83
8.2. ROLE OF THE ATTACKER MODEL FOR CONTROL REQUIREMENTS 85
8.3. DOMAIN OF APPLICATION AND CORRESPONDING ATTACKER MODEL 86
8.4. ARCHITECTURES AND CONTROL REQUIREMENTS 87
9. COMPARING ARCHITECTURES AND LOOSELY RELATED WORK 93
9.1. CRITERIA AND COMPARISON 93
9.2. EXEMPLARY ARCHITECTURES FOR PSEUDONYMOUS AUTHORIZATIONS 96
9.3. DISTINCTION FROM LOOSELY RELATED WORK 103
10. AUDIT DATA PSEUDONYMIZATION AND CLOSELY RELATED WORK 105
10.1. SPECIFIC REQUIREMENTS OF AUDIT DATA PSEUDONYMIZATION 105
10.2. CRITERIA AND COMPARISON 106
10.3. EXEMPLARY APPROACHES TO AUDIT DATA PSEUDONYMIZATION 110
10.4. DISTINCTION FROM CLOSELY RELATED WORK 115
11. CONTRIBUTIONS IN PART I 117
11. SET-BASED APPROACH 119
12. REQUIREMENTS, ASSUMPTIONS AND TRUST MODEL 121
13. MODELING CONDITIONS FOR TECHNICAL PURPOSE BINDING 127
13.1. SET-BASED MODEL OF DISCLOSURE CONDITIONS 127
13.2. A PRIORI KNOWLEDGE 130
13.3. DECISION STRUCTURES 131
CONTENTS
14. CRYPTOGRAPHIC ENFORCEMENT OF DISCLOSURE CONDITIONS 133
14.1. PSEUDONYMITY-LAYER DATA 133
14.2. PROTECTING IDENTITIES IN THE PSEUDONYM MAPPING 134
14.3. PROTECTING SECRETS IN THE PSEUDONYMITY-LAYER 136
14.4. ADAPTED APPLICATION OF SHAMIR S THRESHOLD SCHEME 136
15. THE MISMATCH PROBLEM 139
15.1. DEFINITION OF MISMATCHES 139
15.2. PROBABILITY OF MISMATCHES 140
15.3. TACKLING THE MISMATCH PROBLEM 141
16.OPERATIONAL PSEUDONYMIZATION AND PSEUDONYM DISCLOSURE 145
16.1. INITIALIZATION 148
16.2. PSEUDONYMIZATION 148
16.3. PSEUDONYM DISCLOSURE 149
17. EXTENSIONS 153
17.1. ATTACKER MODEL 153
17.2. COARSENING THE NUMBER OF POTENTIAL ACTORS 155
17.3. USING PSEUDONYM MAPPING ENTRIES AS LINKABILITY LABELS 156
17.4. SIGNIFICANCE OF REPEATED OBSERVATIONS 157
17.5. RECONCILING OBSERVATIONS 159
17.6. ORGANIZATIONAL PURPOSE BINDING 162
17.7. FUTURE EXTENSIONS 164
18. CONTRIBUTIONS IN PART II 167
III. APPLICATION TO UNIX AUDIT DATA 169
19. UNIX AUDIT DATA 171
19.1. UNIX AUDIT ARCHITECTURE 171
19.2. SELECTION OF SYSLOG 173
X.SYDOG 175
20.1. TYPICAL SYSLOG AUDIT DATA 175
* 20.2. SYSLOG AUDIT DATA PROCESSING 177
20.3. EMBEDDING AUDIT DATA PSEUDONYMIZERS 178
21. INSTANTIATING THE SET-BASED APPROACH FOR SYSLOG-STYLE AUDIT DATA 181
* 21.1. LOCATING IDENTIFYING FEATURES IN APPLICATION-LAYER DATA 181
21.2. GENERATING PSEUDONYMITY-LAYER DATA FOR PSEUDONYM DISCLOSURE . . .
183
CONTENTS
21.3. TRUST MODEL AND RELATED ASPECTS 187
21.4. ARCHITECTURE 188
22. IMPLEMENTATION: PSEUDO/CORE 193
22.1. SOFTWARE 193
22.2. DEPLOYMENT 194
22.3. CONFIGURATION 196
22.4. FUNCTIONALITY 199
23.CONTRIBUTIONS IN PART III 203
IV. EVALUATION 205
24. APES: ANONYMITY AND PRIVACY IN ELECTRONIC SERVICES 207
24.1. PROJECT OVERVIEW 207
24.2. BASIC BUILDING BLOCKS FOR ANONYMITY 208
24.3. DESIGN APPROACH 209
25. EVALUATING OUR DESIGN USING BASIC BUILDING BLOCKS FOR ANONYMITY 213
25.1. MAPPING OUR DESIGN TO BUILDING BLOCKS 213
25.2. CONSIDERING BUILDING BLOCKS FOR IMPROVED DESIGN 217
25.3. DESIGN EVALUATION RESULTS 221
26. EVALUATING THE PERFORMANCE OF THE IMPLEMENTATION 223
26.1. PERFORMANCE OF THE CRYPTOGRAPHIC PRIMITIVES 224
26.2. PERFORMANCE OF THE PSEUDONYMIZER 225
26.3. EXEMPLARY PERFORMANCE REQUIREMENTS 229
27. CONTRIBUTIONS IN PART IV 233
V. REFINEMENT OF MISUSE SCENARIO MODELS 235
28. MOTIVATING MODEL REFINEMENTS 237
28.1. COARSE-GRAINED DISCLOSURE CONTEXT 237
28.2. EXCESS PSEUDONYM LINKABILITY 238
29. MODELS OF MISUSE SCENARIOS 241
29.1. RELATED WORK ON SIGNATURE LANGUAGES 243
29.2. SEMANTIC REQUIREMENTS 244
29.3. MODELING FRAMEWORK 248
10
CONTENTS
29.4. LIMITING THE FRAMEWORK FOR PSEUDONYMIZATION 261
30. PSEUDONYMIZATION BASED ON SERIAL SIGNATURE-NETS 269
31. PSEUDONYM LINKABILITY 273
31.1. EXTRACTING LINKABILITY REQUIREMENTS FROM SERIAL SIGNATURE-NETS . .
. 275
31.2. PRIMITIVES FOR TECHNICAL PURPOSE BINDING OF LINKABILITY 279
31.3. OPERATION OF THE PSEUDONYMIZER 281
31.4. OPERATION OF THE ANALYSIS ENGINE 285
32. PSEUDONYM DISCLOSURE 287
32.1. EXTRACTING DISCLOSURE REQUIREMENTS FROM SERIAL SIGNATURE-NETS . .
. 289
32.2. PRIMITIVES FOR TECHNICAL PURPOSE BINDING OF DISCLOSURE 293
32.3. EXTRACTING THRESHOLD SCHEME DESCRIPTIONS FROM SERIAL
SIGNATURE-NETS 301
32.4. PSEUDONYMITY-LAYER DATA 307
32.5. OPERATION OF THE PSEUDONYMIZER 311
32.6. OPERATION OF THE ANALYSIS ENGINE 318
33. FUTURE DIRECTIONS 325
33.1. USABILITY AND APPLICABILITY 325
33.2. PERFORMANCE 326
33.3. SECURITY OF PSEUDONYMIZATION 327
33.4. EXTENSIONS 328
33.5. UNOBSERVABILITY 329
34. CONTRIBUTIONS IN PART V 333
SUMMARY 337
BIBLIOGRAPHY 341
A. THRESHOLD SCHEMES FOR CRYPTOGRAPHIC SECRET SHARING 361
A.L. SHAMIR 361
A.2. KARNIN, GREENE AND HELLMAN 363
B. EXAMPLE APPLICATIONS OF PSEUDO/CORE 365
B.I. WEB-BASED FRONT-END 367
B.2. LINUX USER ACCOUNT LOG-IN 370
B.3. ELECTRONIC CASH 378
B.4. WEB SERVER 388
B.5. ANONYMOUS WEB BROWSING 396
11
CONTENTS
B.6. NETWORK MONITORING TOOL TCPLOG 403
12
|
any_adam_object | 1 |
author | Flegel, Ulrich |
author_facet | Flegel, Ulrich |
author_role | aut |
author_sort | Flegel, Ulrich |
author_variant | u f uf |
building | Verbundindex |
bvnumber | BV024611631 |
ctrlnum | (OCoLC)255001537 (DE-599)BVBBV024611631 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02043nam a2200505 c 4500</leader><controlfield tag="001">BV024611631</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090910 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090924s2006 ad|| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,H06,0018</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">979324793</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255001537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV024611631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Flegel, Ulrich</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pseudonymizing audit data for privacy respecting misuse detection</subfield><subfield code="c">von Ulrich Flegel</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2005 [erschienen] 2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">407 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Dortmund, Univ., Diss., 2006</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer-Missbrauchversicherung</subfield><subfield code="0">(DE-588)4129259-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mikroform</subfield><subfield code="0">(DE-588)4039216-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computer-Missbrauchversicherung</subfield><subfield code="0">(DE-588)4129259-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Mikroform</subfield><subfield code="0">(DE-588)4039216-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018584304&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018584304</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV024611631 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:03:00Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018584304 |
oclc_num | 255001537 |
open_access_boolean | |
owner | DE-83 DE-188 |
owner_facet | DE-83 DE-188 |
physical | 407 S. Ill., graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
record_format | marc |
spelling | Flegel, Ulrich Verfasser aut Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel 2005 [erschienen] 2006 407 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Dortmund, Univ., Diss., 2006 Datenschutz (DE-588)4011134-9 gnd rswk-swf Anonymisierung (DE-588)4139362-4 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Computer-Missbrauchversicherung (DE-588)4129259-5 gnd rswk-swf Mikroform (DE-588)4039216-8 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Eindringerkennung (DE-588)4706627-1 s Anonymisierung (DE-588)4139362-4 s Datenschutz (DE-588)4011134-9 s DE-188 Computer-Missbrauchversicherung (DE-588)4129259-5 s Privatsphäre (DE-588)4123980-5 s Mikroform (DE-588)4039216-8 s 1\p DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018584304&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Flegel, Ulrich Pseudonymizing audit data for privacy respecting misuse detection Datenschutz (DE-588)4011134-9 gnd Anonymisierung (DE-588)4139362-4 gnd Eindringerkennung (DE-588)4706627-1 gnd Privatsphäre (DE-588)4123980-5 gnd Computer-Missbrauchversicherung (DE-588)4129259-5 gnd Mikroform (DE-588)4039216-8 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4139362-4 (DE-588)4706627-1 (DE-588)4123980-5 (DE-588)4129259-5 (DE-588)4039216-8 (DE-588)4113937-9 |
title | Pseudonymizing audit data for privacy respecting misuse detection |
title_auth | Pseudonymizing audit data for privacy respecting misuse detection |
title_exact_search | Pseudonymizing audit data for privacy respecting misuse detection |
title_full | Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel |
title_fullStr | Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel |
title_full_unstemmed | Pseudonymizing audit data for privacy respecting misuse detection von Ulrich Flegel |
title_short | Pseudonymizing audit data for privacy respecting misuse detection |
title_sort | pseudonymizing audit data for privacy respecting misuse detection |
topic | Datenschutz (DE-588)4011134-9 gnd Anonymisierung (DE-588)4139362-4 gnd Eindringerkennung (DE-588)4706627-1 gnd Privatsphäre (DE-588)4123980-5 gnd Computer-Missbrauchversicherung (DE-588)4129259-5 gnd Mikroform (DE-588)4039216-8 gnd |
topic_facet | Datenschutz Anonymisierung Eindringerkennung Privatsphäre Computer-Missbrauchversicherung Mikroform Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018584304&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT flegelulrich pseudonymizingauditdataforprivacyrespectingmisusedetection |