Privacy-Respecting Intrusion Detection

Authors:

ISBN: 978-0-387-34346-4 (Print) 978-0-387-68254-9 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XVIII

  2. Introduction and Background

    1. Front Matter

      Pages 2-2

    2. No Access

      Book Chapter

      Pages 3-8

      Introduction

    3. No Access

      Book Chapter

      Pages 9-12

      Authorizations

    4. No Access

      Book Chapter

      Pages 13-25

      An Architectural Model for Secure Authorizations

    5. No Access

      Book Chapter

      Pages 27-30

      Traditional Security Objectives

    6. No Access

      Book Chapter

      Pages 31-42

      Personal Data Protection Objectives

    7. No Access

      Book Chapter

      Pages 43-46

      The Challenge: Technical Enforcement of Multilateral Security

    8. No Access

      Book Chapter

      Pages 47-54

      Pseudonyms – A Technical Point of View

    9. No Access

      Book Chapter

      Pages 55-63

      An Architectural Model for Pseudonymous and Secure Authorizations

    10. No Access

      Book Chapter

      Pages 65-75

      Comparing Architectures

    11. No Access

      Book Chapter

      Pages 77-87

      Audit Data Pseudonymization

  3. Set-based Approach

    1. Front Matter

      Pages 90-90

    2. No Access

      Book Chapter

      Pages 91-95

      Requirements, Assumptions and Trust Model

    3. No Access

      Book Chapter

      Pages 97-102

      Modeling Conditions for Technical Purpose Binding of Controlled Pseudonym Disclosure

    4. No Access

      Book Chapter

      Pages 103-107

      Cryptographic Enforcement of Disclosure Conditions

    5. No Access

      Book Chapter

      Pages 109-113

      The Mismatch Problem

    6. No Access

      Book Chapter

      Pages 115-121

      Operational Pseudonymization and Pseudonym Disclosure

    7. No Access

      Book Chapter

      Pages 123-134

      Extensions

  4. Application to Unix Audit Data

    1. Front Matter

      Pages 136-136

    2. No Access

      Book Chapter

      Pages 137-140

      Unix Audit Data

    3. No Access

      Book Chapter

      Pages 141-145

      Syslog

    4. No Access

      Book Chapter

      Pages 147-158

      Instantiating the Set-based Approach for Syslog-style Audit Data

    5. No Access

      Book Chapter

      Pages 159-167

      Implementation: Pseudo/CoRe

previous Page of 2