In Sect. 9.1 criteria are given to compare the individual phases of service uti Utilization w.r.t. pseudonymization within the architectural model introduced in Chap. 8. Using numerous examples, in Sect. 9.2 it is shown how the architectural model can be used to classify existing privacy-enhancing technologies (PETs). Finally, in Sect. 9.3 the related work on PETs is separated into direct and indirect audit data pseudonymization. Direct audit data pseudonymization is examined in more detail in Chap. 10.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Comparing Architectures. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_9
Download citation
DOI: https://doi.org/10.1007/978-0-387-68254-9_9
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34346-4
Online ISBN: 978-0-387-68254-9
eBook Packages: Computer ScienceComputer Science (R0)