In Sect. 9.1 criteria are given to compare the individual phases of service uti Utilization w.r.t. pseudonymization within the architectural model introduced in Chap. 8. Using numerous examples, in Sect. 9.2 it is shown how the architectural model can be used to classify existing privacy-enhancing technologies (PETs). Finally, in Sect. 9.3 the related work on PETs is separated into direct and indirect audit data pseudonymization. Direct audit data pseudonymization is examined in more detail in Chap. 10.
KeywordsIntrusion Detection Intrusion Detection System Partial Identity Audit Data Security Objective
Unable to display preview. Download preview PDF.