Introduction and Background | |
Introduction | p. 3 |
Authorizations | p. 9 |
An Architectural Model for Secure Authorizations | p. 13 |
Traditional Security Objectives | p. 27 |
Personal Data Protection Objectives | p. 31 |
Technical Enforcement of Multilateral Security | p. 43 |
Pseudonyms - A Technical Point of View | p. 47 |
An Architectural Model for Pseudonymous Authorizations | p. 55 |
Comparing Architectures | p. 65 |
Audit Data Pseudonymization | p. 77 |
Set-based Approach | |
Requirements, Assumptions and Trust Model | p. 91 |
Modeling Conditions for Technical Purpose Binding | p. 97 |
Cryptographic Enforcement of Disclosure Conditions | p. 103 |
The Mismatch Problem | p. 109 |
Operational Pseudonymization and Pseudonym Disclosure | p. 115 |
Extensions | p. 123 |
Application to Unix Audit Data | |
Unix Audit Data | p. 137 |
Syslog | p. 141 |
Instantiating the Set-based Approach for Syslog Audit Data | p. 147 |
Implementation: Pseudo/CoRe | p. 159 |
Evaluation | |
APES: Anonymity and Privacy in Electronic Services | p. 171 |
Evaluating the Design Using Basic Building Blocks | p. 177 |
Evaluating the Performance of the Implementation | p. 187 |
Refinement of Misuse Scenario Models | |
Motivating Model Refinements | p. 199 |
Models of Misuse Scenarios | p. 203 |
Pseudonymization Based on Serial Signature-Nets | p. 229 |
Pseudonym Linkability | p. 233 |
Pseudonym Disclosure | p. 247 |
Summary | p. 283 |
Threshold Schemes for Cryptographic Secret Sharing | p. 285 |
References | p. 287 |
Index | p. 303 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.