Comparing Architectures

Part of the Advances in Information Security book series (ADIS, volume 35)

In Sect. 9.1 criteria are given to compare the individual phases of service uti Utilization w.r.t. pseudonymization within the architectural model introduced in Chap. 8. Using numerous examples, in Sect. 9.2 it is shown how the architectural model can be used to classify existing privacy-enhancing technologies (PETs). Finally, in Sect. 9.3 the related work on PETs is separated into direct and indirect audit data pseudonymization. Direct audit data pseudonymization is examined in more detail in Chap. 10.


Intrusion Detection Intrusion Detection System Partial Identity Audit Data Security Objective 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2007

Personalised recommendations