[17462] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: de-identification

daemon@ATHENA.MIT.EDU (Florian Weimer)
Mon Jun 13 14:58:37 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: Florian Weimer <fw@deneb.enyo.de>
To: dan@geer.org
Cc: cryptography@metzdowd.com
Date: Sun, 12 Jun 2005 12:17:58 +0200
In-Reply-To: <20050608201906.F3E6C1BF9AD@absinthe.tinho.net> (dan@geer.org's
	message of "Wed, 08 Jun 2005 16:19:06 -0400")

> I'd like to come up to speed on the state of the
> art in de-identification (~=anonymization) of data
> especially monitoring data (firewall/hids logs, say).

We call it pseudonymization ("Pseudonymisierung").  It's a commonly
used technique in Germany to detaint personally identifiable
information, so you can share it freely for statistics purposes.  The
methods used in the field are rather crude (time-seeded LCGs are very
common, unfortunately).

A reference to the book "Translucent Databases" was posted to this
list a couple of months ago, but IIRC it's being revisied, so I didn't
rush to buy and read it.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post