de-identification
Steven M. Bellovin
smb at cs.columbia.edu
Thu Jun 16 17:56:54 EDT 2005
In message <20050608201906.F3E6C1BF9AD at absinthe.tinho.net>, dan at geer.org writes
:
>
>Ladies and Gentlemen,
>
>I'd like to come up to speed on the state of the
>art in de-identification (~=anonymization) of data
>especially monitoring data (firewall/hids logs, say).
>A little googling suggests that this is an academic
>subspeciality as well as a word with many interpretations.
>If someone here can point me at the mother lode of
>insight, I would be most grateful.
>
What's your threat model? It's proved to be a very hard problem to
solve, since there are all sorts of other channels -- application data,
timing data (the remote fingerprinting paper mentioned this one), etc.
--Steven M. Bellovin, http://www.cs.columbia.edu/~smb
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list