Sciweavers

RAID
2000
Springer

Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection

14 years 4 months ago
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is inspected for personal data and identifiers referring to real persons are substituted by transaction-based pseudonyms. These pseudonyms are constructed as shares for a suitably adapted version of Shamir's cryptographic approach to secret sharing. Under sufficient suspicion, expressed as a threshold on shares, audit analyzers can perform reidentification.
Joachim Biskup, Ulrich Flegel
Added 25 Aug 2010
Updated 25 Aug 2010
Type Conference
Year 2000
Where RAID
Authors Joachim Biskup, Ulrich Flegel
Comments (0)