The intrusion detection system AID—architecture, and experiences in automated audit analysis
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Pseudonymous audit for privacy enhanced intrusion detection
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
Intrusion detection: network security beyond the firewall
Intrusion detection: network security beyond the firewall
Technical Enforcement of Informational Assurances
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
On pseudonymization of audit data for intrusion detection
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Managing university internet access: balancing the need for security, privacy and digital evidence
Journal in Computer Virology
Hi-index | 0.00 |
Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is inspected for personal data and identifiers referring to real persons are substituted by transaction-based pseudonyms.Th ese pseudonyms are constructed as shares for a suitably adapted version of Shamir's cryptographic approach to secret sharing. Under sufficient suspicion, expressed as a threshold on shares, audit analyzers can perform reidentification.