Audit Data Pseudonymization
In Chap. 9 architectures for anonymous and pseudonymous authorizations have been reviewed. In this Chapter, approaches for direct audit data pseudonymization are examined and compared (cf. Sect. 9.3). The task of directly anonymizing or pseudonymizing audit data makes some specific demands, which are described in Sect. 10.1. In Sect. 10.2 criteria are given, which allow to compare existing approaches. Selected approaches are described in Sect. 10.3. Finally, the distinction between the presented approaches and the approaches developed in this book is emphasized in Sect. 10.4. In the remainder of this book we denote direct audit data pseudonymization simply as audit data pseudonymization.
KeywordsIntrusion Detection Anomaly Detection Audit Data Symmetric Encryption Audit Record
Unable to display preview. Download preview PDF.