[17462] in cryptography@c2.net mail archive
Re: de-identification
daemon@ATHENA.MIT.EDU (Florian Weimer)
Mon Jun 13 14:58:37 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: dan@geer.org
Cc: cryptography@metzdowd.com
Date: Sun, 12 Jun 2005 12:17:58 +0200
In-Reply-To: <20050608201906.F3E6C1BF9AD@absinthe.tinho.net> (dan@geer.org's
message of "Wed, 08 Jun 2005 16:19:06 -0400")
> I'd like to come up to speed on the state of the
> art in de-identification (~=anonymization) of data
> especially monitoring data (firewall/hids logs, say).
We call it pseudonymization ("Pseudonymisierung"). It's a commonly
used technique in Germany to detaint personally identifiable
information, so you can share it freely for statistics purposes. The
methods used in the field are rather crude (time-seeded LCGs are very
common, unfortunately).
A reference to the book "Translucent Databases" was posted to this
list a couple of months ago, but IIRC it's being revisied, so I didn't
rush to buy and read it.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com