[17409] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

de-identification

daemon@ATHENA.MIT.EDU (dan@geer.org)
Wed Jun 8 21:23:05 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: dan@geer.org
To: cryptography@metzdowd.com
Date: Wed, 08 Jun 2005 16:19:06 -0400


Ladies and Gentlemen,

I'd like to come up to speed on the state of the
art in de-identification (~=anonymization) of data
especially monitoring data (firewall/hids logs, say).
A little googling suggests that this is an academic
subspeciality as well as a word with many interpretations.
If someone here can point me at the mother lode of 
insight, I would be most grateful.

--dan


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post