|Title:||Evaluating the design of an audit data pseudonymizer using basic building blocks for anonymity|
|Abstract:||Using an audit data pseudonymization system as an example, we show how the APES approach for basic anonymity building blocks can be used to informally evaluate the design of a given anonymity system. As a by-product we obtain indications of the usefulness and (in)completeness of the APES building blocks approach.|
|Provenance:||GI SIGs SIDAR and PET|
|Is part of:||Privacy Respecting Incident Management 2005, April 6th, Regensburg, Germany|
|Appears in Collections:||Papers|
This item is protected by original copyright
Items in Eldorado are protected by copyright, with all rights reserved, unless otherwise indicated.