The set-based approach is not concerned with the selection of appropriate pseudonyms, due to reasons given in Chap. 11. Rather, our approach is concerned with the protection of the pseudonym mapping, which enables the controlled disclosure of the pseudonyms. In this Chapter we show how we can use cryptographic primitives to technically enforce the disclosure conditions of disclosure contexts as defined in Sect. 12.1.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Cryptographic Enforcement of Disclosure Conditions. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-68254-9_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34346-4
Online ISBN: 978-0-387-68254-9
eBook Packages: Computer ScienceComputer Science (R0)