0

Privacy-Respecting Intrusion Detection

Advances in Information Security 35

Erschienen am 19.11.2010, 1. Auflage 2007
155,14 €
(inkl. MwSt.)

Lieferbar innerhalb ca. 1 - 3 Wochen

In den Warenkorb
Bibliografische Daten
ISBN/EAN: 9781441941756
Sprache: Englisch
Umfang: xx, 307 S., 61 s/w Illustr., 307 p. 61 illus.
Einband: kartoniertes Buch

Beschreibung

Inhaltsangabeand Background.- Authorizations.- An Architectural Model for Secure Authorizations.- Traditional Security Objectives.- Personal Data Protection Objectives.- The Challenge: Technical Enforcement of Multilateral Security.- Pseudonyms - A Technical Point of View.- An Architectural Model for Pseudonymous and Secure Authorizations.- Comparing Architectures.- Audit Data Pseudonymization.- Set-based Approach.- Requirements, Assumptions and Trust Model.- Modeling Conditions for Technical Purpose Binding of Controlled Pseudonym Disclosure.- Cryptographic Enforcement of Disclosure Conditions.- The Mismatch Problem.- Operational Pseudonymization and Pseudonym Disclosure.- Extensions.- Application to Unix Audit Data.- Unix Audit Data.- Syslog.- Instantiating the Set-based Approach for Syslog-style Audit Data.- Implementation: Pseudo/CoRe.- Evaluation.- APES: Anonymity and Privacy in Electronic Services.- Evaluating the Design Using Basic Building Blocks for Anonymity.- Evaluating the Performance of the Implementation.- Refinement of Misuse Scenario Models.- Motivating Model Refinements.- Models of Misuse Scenarios.- Pseudonymization Based on Serial Signature-Nets.- Pseudonym Linkability.- Pseudonym Disclosure.

Produktsicherheitsverordnung

Hersteller:
Springer Verlag GmbH
juergen.hartmann@springer.com
Tiergartenstr. 17
DE 69121 Heidelberg

Inhalt

-Foreword by Richard A. Kemmerer, University of California, Santa Barbara, USA.- Introduction and Background.- Introduction.- Authorizations.- An Architectural Model for Secure Authorizations.- Traditional Security Objectives.- Personal Data Protection Objectives.- Technical Enforcement of Multilateral Security.- Pseudonyms - A Technical Point of View.- An Architectural Model for Pseudonymous Authorizations.- Comparing Architectures.- Audit Data Pseudonymization.- Set-Based Approach.- Requirements, Assumptions and Trust Model.- Modeling Conditions for Technical Purpose Binding.- Cryptographic Enforcement of Disclosure Conditions.- The Mismatch Problem.- Operational Pseudonymization and Pseudonym Disclosure.- Extensions.- Application to Unix Audit Data.- Unix Audit Data.- Syslog.- Instantiating the Set-Based Approach for Syslog Audit Data.- Implementation: Pseudo/CoRe.- Evaluation.- APES: Anonymity and Privacy in Electronic Services.- Evaluating the Design Using Basic Building Blocks.- Evaluating the Performance of the Implementation.- Refinement of Misuse Scenario Models.- Motivating Model Refinements.- Models of Misuse Scenarios.- Pseudonymization Based on Serial Signature-Nets.- Pseudonym Linkability.- Pseudonym Disclosure.- Summary.- Threshold Schemes for Cryptographic Secret Sharing.- References.- Index.