Audit Data Pseudonymization

Part of the Advances in Information Security book series (ADIS, volume 35)

In Chap. 9 architectures for anonymous and pseudonymous authorizations have been reviewed. In this Chapter, approaches for direct audit data pseudonymization are examined and compared (cf. Sect. 9.3). The task of directly anonymizing or pseudonymizing audit data makes some specific demands, which are described in Sect. 10.1. In Sect. 10.2 criteria are given, which allow to compare existing approaches. Selected approaches are described in Sect. 10.3. Finally, the distinction between the presented approaches and the approaches developed in this book is emphasized in Sect. 10.4. In the remainder of this book we denote direct audit data pseudonymization simply as audit data pseudonymization.


Intrusion Detection Anomaly Detection Audit Data Symmetric Encryption Audit Record 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2007

Personalised recommendations