Flegel, Ulrich
Privacy-Respecting Intrusion Detection
Part I.Introduction and Background
1. Introduction
2. Authorizations
3. An Architectural Model for Secure Authorizations
4. Traditional Security Objectives
5. Personal Data Protection Objectives
6. The Challenge: Technical Enforcement of Multilateral Security
7. Pseudonyms – A Technical Point of View
8. An Architectural Model for Pseudonymous and Secure Authorizations
9. Comparing Architectures
10. Audit Data Pseudonymization
Part II.Set-based Approach
11. Requirements, Assumptions and Trust Model
12. Modeling Conditions for Technical Purpose Binding of Controlled Pseudonym Disclosure
13. Cryptographic Enforcement of Disclosure Conditions
14. The Mismatch Problem
15. Operational Pseudonymization and Pseudonym Disclosure
16. Extensions
Part III.Application to Unix Audit Data
17. Unix Audit Data
18. Syslog
19. Instantiating the Set-based Approach for Syslog-style Audit Data
20. Implementation: Pseudo/CoRe
Part IV.Evaluation
21. APES: Anonymity and Privacy in Electronic Services
22. Evaluating the Design Using Basic Building Blocks for Anonymity
23. Evaluating the Performance of the Implementation
Part V.Refinement of Misuse Scenario Models
24. Motivating Model Refinements
25. Models of Misuse Scenarios
26. Pseudonymization Based on Serial Signature-Nets
27. Pseudonym Linkability
28. Pseudonym Disclosure
DRM-restrictions
Printing: not available
Clipboard copying: not available
Nyckelord: COMPUTERS / Computer Science COM014000
- Författare
- Flegel, Ulrich
- Utgivare
- Springer
- Utgivningsår
- 2008
- Språk
- en
- Utgåva
- 1
- Kategori
- Datateknik, Datakommunikation
- Format
- E-bok
- eISBN (PDF)
- 9780387682549