In this Chapter some extensions to the basic algorithms from Chap. 15 are proposed. The extension in Sect. 16.1 considers a finer-grained attacker model. In Sect. 16.2 an extension is given that allows to conceal the number of entities in a disclosure context. This extension does not work for shares marked with linkability labels. Conversely, the extension in Sect. 16.3 is suitable to implement the mismatch avoidance approach in practice. Two further extensions that allow to specify more concise models of disclosure scenarios are given in Sect. 16.4 and in Sect. 16.5. Finally, Sect. 16.6 outlines, how our approach for technical purpose binding of pseudonym disclosure can be combined with organizational purpose binding.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Extensions. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_16
Download citation
DOI: https://doi.org/10.1007/978-0-387-68254-9_16
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34346-4
Online ISBN: 978-0-387-68254-9
eBook Packages: Computer ScienceComputer Science (R0)