Skip to:Content
|
Bottom
Cover image for Privacy-respecting intrusion detection
Title:
Privacy-respecting intrusion detection
Personal Author:
Series:
Advances in information security ; 35
Publication Information:
New York, NY : Springer-Verlag, 2007
Physical Description:
xvii, 307 p. : ill. ; 24 cm.
ISBN:
9780387343464

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010184063 QA76.9.A25 F53 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept, which led to security kernel architectures. In the mid to late 1970s a number of systems were designed and implemented using a security kernel architecture. These systems were mostly sponsored by the defense establishment and were not in wide use. Fast forwarding to more recent times, the advent of the world-wide web, inexp- sive workstations for the o?ce and home, and high-speed connections has made it possible for most people to be connected. This access has greatly bene?ted society allowing users to do their banking, shopping, and research on the Int- net. Most every business, government agency, and public institution has a public facing web page that can be accessed by anyone anywhere on the Internet. - fortunately, society's increased dependency on networked software systems has also given easy access to the attackers, and the number of attacks is steadily increasing.


Table of Contents

Part I Introduction and Background
1 Introductionp. 3
2 Authorizationsp. 9
3 An Architectural Model for Secure Authorizationsp. 13
4 Traditional Security Objectivesp. 27
5 Personal Data Protection Objectivesp. 31
6 Technical Enforcement of Multilateral Securityp. 43
7 Pseudonyms - A Technical Point of Viewp. 47
8 An Architectural Model for Pseudonymous Authorizationsp. 55
9 Comparing Architecturesp. 65
10 Audit Data Pseudonymizationp. 77
Part II Set-based Approach
11 Requirements, Assumptions and Trust Modelp. 91
12 Modeling Conditions for Technical Purpose Bindingp. 97
13 Cryptographic Enforcement of Disclosure Conditionsp. 103
14 The Mismatch Problemp. 109
15 Operational Pseudonymization and Pseudonym Disclosurep. 115
16 Extensionsp. 123
Part III Application to Unix Audit Data
17 Unix Audit Datap. 137
18 Syslogp. 141
19 Instantiating the Set-based Approach for Syslog Audit Datap. 147
20 Implementation: Pseudo/CoRep. 159
Part IV Evaluation
21 APES: Anonymity and Privacy in Electronic Servicesp. 171
22 Evaluating the Design Using Basic Building Blocksp. 177
23 Evaluating the Performance of the Implementationp. 187
Part V Refinement of Misuse Scenario Models
24 Motivating Model Refinementsp. 199
25 Models of Misuse Scenariosp. 203
26 Pseudonymization Based on Serial Signature-Netsp. 229
27 Pseudonym Linkabilityp. 233
28 Pseudonym Disclosurep. 247
Summaryp. 283
A Threshold Schemes for Cryptographic Secret Sharingp. 285
Referencesp. 287
Indexp. 303
Go to:Top of Page