In message <[EMAIL PROTECTED]>, [EMAIL PROTECTED] writes
:
>
>Ladies and Gentlemen,
>
>I'd like to come up to speed on the state of the
>art in de-identification (~=anonymization) of data
>especially monitoring data (firewall/hids logs, say).
>A little googling suggests that this is an academic
>subspeciality as well as a word with many interpretations.
>If someone here can point me at the mother lode of 
>insight, I would be most grateful.
>

What's your threat model?  It's proved to be a very hard problem to 
solve, since there are all sorts of other channels -- application data, 
timing data (the remote fingerprinting paper mentioned this one), etc.

                --Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to