Privacy-Respecting Intrusion Detection
(Sprache: Englisch)
This book introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection, and limits the recovery of personal data. Includes case studies and solutions, with algorithms.
Leider schon ausverkauft
versandkostenfrei
Buch
159.49 €
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenlose Rücksendung
- Ratenzahlung möglich
Produktdetails
Produktinformationen zu „Privacy-Respecting Intrusion Detection “
This book introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection, and limits the recovery of personal data. Includes case studies and solutions, with algorithms.
Klappentext zu „Privacy-Respecting Intrusion Detection “
Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.Inhaltsverzeichnis zu „Privacy-Respecting Intrusion Detection “
- Preface- Introduction and Background
- Introduction
- Authorizations
- An Architectural Model for Secure Authorizations
- Traditional Security Objectives
- Personal Data Protection Objectives
- The Challenge: Technical Enforcement of Multilateral Security
- Pseudonyms - A Technical Point of View
- An Architectural Model for Pseudonymous and Secure Authorizations
- Comparing Architectures and Loosely Related Work
- Audit Data Pseudonymization and Closely Related Work
- Coarse-grained Approach
- Requirements, Assumptions and Trust Model
- Modeling Conditions for Technical Purpose Binding
- Cryptographic Enforcement of Disclosure Conditions
- The Mismatch Problem
- Operational Pseudonymization and Pseudonym Disclosure
- Application to Unix Audit Data
- Unix Audit Data
- Syslog
- Instantiating the Coarse-grained Approach for Syslog-style Audit Data
- Implementation: Pseudo/CoRe
- Evaluation
- APES: Anonymity and Privacy in Electronic Services
- Evaluating the Design Using Basic Building Blocks for Anonymity
- Evaluating the Performance of the Implementation
- Fine-grained Approach
- Motivating Model Refinements
- Models of Misuse Scenarios
- Pseudonymization Based on Serial Signature-Nets
- Pseudonym Linkability
- Pseudonym Disclosure
- Summary
- Bibliography
- A. Threshold Schemes for Cryptographic Secret Sharing
- B. Example Applications of Pseudo/CoRe
- Index
Bibliographische Angaben
- Autor: Ulrich Flegel
- 2007, 328 Seiten, Maße: 16 x 24,1 cm, Gebunden, Englisch
- Verlag: Springer US
- ISBN-10: 0387343466
- ISBN-13: 9780387343464
- Erscheinungsdatum: 12.10.2007
Sprache:
Englisch
Kommentar zu "Privacy-Respecting Intrusion Detection"
Schreiben Sie einen Kommentar zu "Privacy-Respecting Intrusion Detection".
Kommentar verfassen