A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Distance-preserving pseudonymization for timestamps and spatial data
2007
Proceedings of the 2007 ACM workshop on Privacy in electronic society - WPES '07
The need for privacy in intrusion detection data, such as audit logs is widely recognized. The prevalent method for privacy protection in audit logs is pseudonymization (and suppression). There is a clear trade-off between the privacy of a pseudonymization technique and its utility for intrusion detection. E.g., for IP addresses a method for prefixpreserving pseudonymization has been developed, that allows pseudonymized IP addresses to be still grouped into subnets. This paper describes a
doi:10.1145/1314333.1314346
dblp:conf/wpes/Kerschbaum07
fatcat:uq4p5sxpjjadfc5zxr52dulad4