Evaluating the design of an audit data pseudonymizer using basic building blocks for anonymity
dc.contributor.author | Flegel, Ulrich | |
dc.date.accessioned | 2006-08-21T07:08:36Z | |
dc.date.available | 2006-08-21T07:08:36Z | |
dc.date.issued | 2005-04 | |
dc.description.abstract | Using an audit data pseudonymization system as an example, we show how the APES approach for basic anonymity building blocks can be used to informally evaluate the design of a given anonymity system. As a by-product we obtain indications of the usefulness and (in)completeness of the APES building blocks approach. | en |
dc.format.extent | 72345 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/2003/22828 | |
dc.identifier.uri | http://dx.doi.org/10.17877/DE290R-15954 | |
dc.language.iso | en | |
dc.publisher | GI SIGs SIDAR and PET | en |
dc.relation.ispartof | Privacy Respecting Incident Management 2005, April 6th, Regensburg, Germany | en |
dc.subject | Anonymity | en |
dc.subject | Pseudonyms | en |
dc.subject.ddc | 004 | |
dc.title | Evaluating the design of an audit data pseudonymizer using basic building blocks for anonymity | en |
dc.type | Text | de |
dc.type.publicationtype | conferenceObject | en |
dcterms.accessRights | open access |