> I'd like to come up to speed on the state of the
> art in de-identification (~=anonymization) of data
> especially monitoring data (firewall/hids logs, say).

We call it pseudonymization ("Pseudonymisierung").  It's a commonly
used technique in Germany to detaint personally identifiable
information, so you can share it freely for statistics purposes.  The
methods used in the field are rather crude (time-seeded LCGs are very
common, unfortunately).

A reference to the book "Translucent Databases" was posted to this
list a couple of months ago, but IIRC it's being revisied, so I didn't
rush to buy and read it.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to