Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
Adam J. SlagellWilliam YurcikPublished in: CoRR (2004)
Keyphrases
- computer networks
- data privacy
- security problems
- preserving privacy
- network security
- privacy preserving
- data sharing
- privacy preservation
- privacy protection
- security issues
- differential privacy
- information loss
- data publishing
- privacy issues
- network management
- privacy requirements
- data anonymization
- data security
- privacy concerns
- sensitive data
- statistical databases
- personal data
- personal information
- network traffic
- anonymized data
- intrusion detection
- intrusion detection system
- computer network security
- information sharing
- privacy preserving data mining
- privacy guarantees
- confidential information
- communication networks
- privacy preserving data publishing
- data mining
- computer systems
- sensitive information
- security policies
- information security
- security mechanisms
- private information
- access control
- digital copyright protection
- real world
- disclosure control
- confidential data
- social network data
- security requirements
- anomaly detection
- data protection
- authentication protocol
- information systems
- smart grid
- cyber security