Pt. I | | Introduction and Background | | |
1 | | Introduction | | 3 |
2 | | Authorizations | | 9 |
3 | | An Architectural Model for Secure Authorizations | | 13 |
4 | | Traditional Security Objectives | | 27 |
5 | | Personal Data Protection Objectives | | 31 |
6 | | Technical Enforcement of Multilateral Security | | 43 |
7 | | Pseudonyms - A Technical Point of View | | 47 |
8 | | An Architectural Model for Pseudonymous Authorizations | | 55 |
9 | | Comparing Architectures | | 65 |
10 | | Audit Data Pseudonymization | | 77 |
Pt. II | | Set-based Approach | | |
11 | | Requirements, Assumptions and Trust Model | | 91 |
12 | | Modeling Conditions for Technical Purpose Binding | | 97 |
13 | | Cryptographic Enforcement of Disclosure Conditions | | 103 |
14 | | The Mismatch Problem | | 109 |
15 | | Operational Pseudonymization and Pseudonym Disclosure | | 115 |
16 | | Extensions | | 123 |
Pt. III | | Application to Unix Audit Data | | |
17 | | Unix Audit Data | | 137 |
18 | | Syslog | | 141 |
19 | | Instantiating the Set-based Approach for Syslog Audit Data | | 147 |
20 | | Implementation: Pseudo/CoRe | | 159 |
Pt. IV | | Evaluation | | |
21 | | APES: Anonymity and Privacy in Electronic Services | | 171 |
22 | | Evaluating the Design Using Basic Building Blocks | | 177 |
| | More... | | |