skip to content
Privacy-respecting intrusion detection Preview this item
ClosePreview this item
Checking...

Privacy-respecting intrusion detection

Author: Ulrich Flegel
Publisher: New York : Springer, ©2007.
Series: Advances in information security, 35.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Publication:Springer e-books
Summary:
"With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond to misuse or abusive activity in IT systems, one needs to establish the capability to detect and understand improper activity. Intrusion Detection Systems observe activity occurring in the IT system, record these observations in audit data, and analyze collected audit data to detect misuse.  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Flegel, Ulrich.
Privacy-respecting intrusion detection.
New York : Springer, ©2007
(OCoLC)183140943
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ulrich Flegel
ISBN: 9780387682549 0387682546 9780387343464 0387343466 1281044636 9781281044631
OCLC Number: 262687498
Description: 1 online resource (xvii, 307 pages) : illustrations.
Contents: Foreword by Richard A. Kemmerer, University of California, Santa Barbara, USA --
Introduction and Background --
Introduction --
Authorizations --
An Architectural Model for Secure Authorizations --
Traditional Security Objectives --
Personal Data Protection Objectives --
Technical Enforcement of Multilateral Security --
Pseudonyms --
A Technical Point of View --
An Architectural Model for Pseudonymous Authorizations --
Comparing Architectures --
Audit Data Pseudonymization --
Set-Based Approach --
Requirements, Assumptions and Trust Model --
Modeling Conditions for Technical Purpose Binding --
Cryptographic Enforcement of Disclosure Conditions --
The Mismatch Problem --
Operational Pseudonymization and Pseudonym Disclosure --
Extensions --
Application to Unix Audit Data --
Unix Audit Data --
Syslog --
Instantiating the Set-Based Approach for Syslog Audit Data --
Implementation: Pseudo/CoRe --
Evaluation --
APES: Anonymity and Privacy in Electronic Services --
Evaluating the Design Using Basic Building Blocks --
Evaluating the Performance of the Implementation --
Refinement of Misuse Scenario Models --
Motivating Model Refinements --
Models of Misuse Scenarios --
Pseudonymization Based on Serial Signature-Nets --
Pseudonym Linkability --
Pseudonym Disclosure --
Summary --
Threshold Schemes for Cryptographic Secret Sharing --
References --
Index.
Series Title: Advances in information security, 35.
Responsibility: by Ulrich Flegel.

Abstract:

This book introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection, and limits the recovery of  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/262687498> # Privacy-respecting intrusion detection
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "262687498" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nyu> ;
   library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://id.worldcat.org/fast/1765706> ; # Computer networks--Monitoring
   schema:about <http://experiment.worldcat.org/entity/work/data/117223980#Topic/informatique> ; # Informatique
   schema:about <http://id.loc.gov/authorities/subjects/sh85029553> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://id.worldcat.org/fast/1762593> ; # Intrusion detection systems (Computer security)
   schema:about <http://id.loc.gov/authorities/subjects/sh2006002867> ; # Computer networks--Monitoring
   schema:about <http://experiment.worldcat.org/entity/work/data/117223980#Topic/computer_networks_monitoring> ; # Computer networks--Monitoring
   schema:about <http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_access_control> ; # Computers--Access control
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
   schema:bookFormat schema:EBook ;
   schema:copyrightYear "2007" ;
   schema:creator <http://viaf.org/viaf/33986892> ; # Ulrich Flegel
   schema:datePublished "2007" ;
   schema:description "Foreword by Richard A. Kemmerer, University of California, Santa Barbara, USA -- Introduction and Background -- Introduction -- Authorizations -- An Architectural Model for Secure Authorizations -- Traditional Security Objectives -- Personal Data Protection Objectives -- Technical Enforcement of Multilateral Security -- Pseudonyms -- A Technical Point of View -- An Architectural Model for Pseudonymous Authorizations -- Comparing Architectures -- Audit Data Pseudonymization -- Set-Based Approach -- Requirements, Assumptions and Trust Model -- Modeling Conditions for Technical Purpose Binding -- Cryptographic Enforcement of Disclosure Conditions -- The Mismatch Problem -- Operational Pseudonymization and Pseudonym Disclosure -- Extensions -- Application to Unix Audit Data -- Unix Audit Data -- Syslog -- Instantiating the Set-Based Approach for Syslog Audit Data -- Implementation: Pseudo/CoRe -- Evaluation -- APES: Anonymity and Privacy in Electronic Services -- Evaluating the Design Using Basic Building Blocks -- Evaluating the Performance of the Implementation -- Refinement of Misuse Scenario Models -- Motivating Model Refinements -- Models of Misuse Scenarios -- Pseudonymization Based on Serial Signature-Nets -- Pseudonym Linkability -- Pseudonym Disclosure -- Summary -- Threshold Schemes for Cryptographic Secret Sharing -- References -- Index."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/117223980> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/117223980#Series/advances_in_information_security> ; # Advances in information security ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/183140943> ;
   schema:name "Privacy-respecting intrusion detection"@en ;
   schema:productID "262687498" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/262687498#PublicationEvent/new_york_springer_2007> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/117223980#Agent/springer> ; # Springer
   schema:reviews <http://www.worldcat.org/title/-/oclc/262687498#Review/1639035761> ;
   schema:url <http://www.myilibrary.com?id=104463> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=372559> ;
   schema:url <http://site.ebrary.com/id/10191945> ;
   schema:url <http://rave.ohiolink.edu/ebooks/ebc/9780387682549> ;
   schema:url <https://login.proxy.bib.uottawa.ca/login?url=http://ebookcentral.proquest.com/lib/ottawa/detail.action?docID=372559> ;
   schema:url <http://link.springer.com/10.1007/978-0-387-68254-9> ;
   schema:url <http://www.springerlink.com/openurl.asp?genre=book&isbn=978-0-387-34346-4> ;
   schema:url <http://www.myilibrary.com?id=104463&ref=toc> ;
   schema:url <http://dx.doi.org/10.1007/978-0-387-68254-9> ;
   schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=4418230> ;
   schema:url <http://gate.lib.buffalo.edu/login?url=https://link.springer.com/book/10.1007/978-0-387-68254-9> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=254722> ;
   schema:url <https://login.proxy.lib.strath.ac.uk/login?url=http://dx.doi.org/10.1007/978-0-387-68254-9> ;
   schema:url <http://link.springer.com/openurl?genre=book&isbn=978-0-387-34346-4> ;
   schema:url <https://link.springer.com/openurl?genre=book&isbn=978-0-387-34346-4> ;
   schema:workExample <http://worldcat.org/isbn/9780387682549> ;
   schema:workExample <http://worldcat.org/isbn/9780387343464> ;
   schema:workExample <http://worldcat.org/isbn/9781281044631> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/262687498> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
   schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/117223980#Series/advances_in_information_security> # Advances in information security ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/262687498> ; # Privacy-respecting intrusion detection
   schema:name "Advances in information security ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/117223980#Topic/computer_networks_monitoring> # Computer networks--Monitoring
    a schema:Intangible ;
   schema:name "Computer networks--Monitoring"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_access_control> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/117223980#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2006002867> # Computer networks--Monitoring
    a schema:Intangible ;
   schema:name "Computer networks--Monitoring"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029553> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/1762593> # Intrusion detection systems (Computer security)
    a schema:Intangible ;
   schema:name "Intrusion detection systems (Computer security)"@en ;
    .

<http://id.worldcat.org/fast/1765706> # Computer networks--Monitoring
    a schema:Intangible ;
   schema:name "Computer networks--Monitoring"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://link.springer.com/10.1007/978-0-387-68254-9>
   rdfs:comment "from Springer" ;
   rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://link.springer.com/openurl?genre=book&isbn=978-0-387-34346-4>
   rdfs:comment "Springer eBooks (Computer Science 2007)" ;
    .

<http://viaf.org/viaf/33986892> # Ulrich Flegel
    a schema:Person ;
   schema:familyName "Flegel" ;
   schema:givenName "Ulrich" ;
   schema:name "Ulrich Flegel" ;
    .

<http://worldcat.org/isbn/9780387343464>
    a schema:ProductModel ;
   schema:isbn "0387343466" ;
   schema:isbn "9780387343464" ;
    .

<http://worldcat.org/isbn/9780387682549>
    a schema:ProductModel ;
   schema:isbn "0387682546" ;
   schema:isbn "9780387682549" ;
    .

<http://worldcat.org/isbn/9781281044631>
    a schema:ProductModel ;
   schema:isbn "1281044636" ;
   schema:isbn "9781281044631" ;
    .

<http://www.worldcat.org/oclc/183140943>
    a schema:CreativeWork ;
   rdfs:label "Privacy-respecting intrusion detection." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/262687498> ; # Privacy-respecting intrusion detection
    .

<http://www.worldcat.org/title/-/oclc/262687498#Review/1639035761>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/262687498> ; # Privacy-respecting intrusion detection
   schema:reviewBody ""With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond to misuse or abusive activity in IT systems, one needs to establish the capability to detect and understand improper activity. Intrusion Detection Systems observe activity occurring in the IT system, record these observations in audit data, and analyze collected audit data to detect misuse. Collecting and processing audit data for misuse detection conflicts with expectations and rights of system users regarding their privacy. A viable solution is replacing personal data with pseudonyms in audit data." "Privacy-Respecting Intrusion Detection introduces technical purpose binding, restricting the linkability of pseudonyms in audit data to the amount required for misuse detection. Also, it limits the recovery of original personal data to pseudonyms involved in a detected misuse scenario. This book includes case studies with constructively validated solutions by providing algorithms." "Privacy-Respecting Intrusion Detection is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as an advance-level text in the computer science field."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.