de-identification

Steven M. Bellovin smb at cs.columbia.edu
Thu Jun 16 17:56:54 EDT 2005


In message <20050608201906.F3E6C1BF9AD at absinthe.tinho.net>, dan at geer.org writes
:
>
>Ladies and Gentlemen,
>
>I'd like to come up to speed on the state of the
>art in de-identification (~=anonymization) of data
>especially monitoring data (firewall/hids logs, say).
>A little googling suggests that this is an academic
>subspeciality as well as a word with many interpretations.
>If someone here can point me at the mother lode of 
>insight, I would be most grateful.
>

What's your threat model?  It's proved to be a very hard problem to 
solve, since there are all sorts of other channels -- application data, 
timing data (the remote fingerprinting paper mentioned this one), etc.

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list