Pseudonymous Audit for Privacy Enhanced Intrusion Detection

  • Sobirey M
  • Fischer-Hübner S
  • Rannenberg K
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Intrusion detection systems can serve as powerful security audit analysis tools. But by analysing the user activities, they are affecting the privacy of the users at the same time. Pseudonymous audit can be the basis for privacy enhanced intrusion detection. In this paper, the concept of pseudonymous audit for privacy enhanced intrusion detection and its prototype realisations are presented. Furthermore it is discussed whether IT security evaluation criteria cover pseudonymous audit and the respective changes are suggested. •

Cite

CITATION STYLE

APA

Sobirey, M., Fischer-Hübner, S., & Rannenberg, K. (1997). Pseudonymous Audit for Privacy Enhanced Intrusion Detection. In Information Security in Research and Business (pp. 151–163). Springer US. https://doi.org/10.1007/978-0-387-35259-6_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free