Full metadata record
DC FieldValueLanguage
dc.contributor.authorFlegel, Ulrich-
dc.date.accessioned2006-08-21T07:08:36Z-
dc.date.available2006-08-21T07:08:36Z-
dc.date.issued2005-04-
dc.identifier.urihttp://hdl.handle.net/2003/22828-
dc.identifier.urihttp://dx.doi.org/10.17877/DE290R-15954-
dc.description.abstractUsing an audit data pseudonymization system as an example, we show how the APES approach for basic anonymity building blocks can be used to informally evaluate the design of a given anonymity system. As a by-product we obtain indications of the usefulness and (in)completeness of the APES building blocks approach.en
dc.format.extent72345 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.publisherGI SIGs SIDAR and PETen
dc.relation.ispartofPrivacy Respecting Incident Management 2005, April 6th, Regensburg, Germanyen
dc.subjectAnonymityen
dc.subjectPseudonymsen
dc.subject.ddc004-
dc.titleEvaluating the design of an audit data pseudonymizer using basic building blocks for anonymityen
dc.typeTextde
dc.type.publicationtypeconferenceObjecten
dcterms.accessRightsopen access-
Appears in Collections:Papers

Files in This Item:
File Description SizeFormat 
FlegelPaper.pdfDNB70.65 kBAdobe PDFView/Open


This item is protected by original copyright



This item is protected by original copyright rightsstatements.org