메뉴 건너뛰기




Volumn , Issue , 2006, Pages 63-77

FLAIM: A multi-level anonymization framework for computer and network logs

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION MANAGEMENT;

EID: 84886395955     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (41)

References (22)
  • 3
    • 0014814325 scopus 로고
    • Space/Time Trade-offs in Hash Coding with Allowable Errors
    • Bloom, B. H., "Space/Time Trade-offs in Hash Coding with Allowable Errors," Communications of the ACM, Vol. 13, Num. 7, pp. 422-426, 1970
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B. H.1
  • 5
    • 85094322053 scopus 로고    scopus 로고
    • NSA Killed System that Sifted Phone Data Legally
    • The Baltimore Sun, May 17
    • Gorman, S., "NSA Killed System that Sifted Phone Data Legally," The Baltimore Sun, May 17, 2006
    • (2006)
    • Gorman, S.1
  • 6
    • 85094315224 scopus 로고    scopus 로고
    • IANA IPv4 Protocol Numbers Assignment, Mar
    • IANA IPv4 Protocol Numbers Assignment, http:// www.iana.org/assignments/protocol-numbers, Mar., 2006
    • (2006)
  • 7
    • 85094319155 scopus 로고    scopus 로고
    • Internet Attack is called Broad and Long Lasting
    • New York Times, Sec. A, Col. May 10
    • Markoff, J., and Bergman, L., "Internet Attack is called Broad and Long Lasting," New York Times, Sec. A, Col. 1, p. 1, May 10, 2005
    • (2005) , vol.1 , pp. 1
    • Markoff, J.1    Bergman, L.2
  • 8
    • 85084159849 scopus 로고    scopus 로고
    • Privacy-Preserving Sharing and Correlation of Security Alerts
    • San Diego, CA, Aug
    • Lincoln, P., Porras, P., and Shmatikov, V., "Privacy-Preserving Sharing and Correlation of Security Alerts," 13th USENIX Security Symposium, San Diego, CA, Aug., 2004
    • (2004) 13th USENIX Security Symposium
    • Lincoln, P.1    Porras, P.2    Shmatikov, V.3
  • 10
    • 10444260259 scopus 로고    scopus 로고
    • A High-Level Programming Environment for Packet Trace Anonymization and Transformation
    • Karlsruhe, Germany, Aug
    • Pang, R., and Paxson, V., "A High-Level Programming Environment for Packet Trace Anonymization and Transformation," ACM SIGCOMM Conference, Karlsruhe, Germany, Aug., 2003
    • (2003) ACM SIGCOMM Conference
    • Pang, R.1    Paxson, V.2
  • 12
    • 33745788676 scopus 로고    scopus 로고
    • California Reports Massive Data Breach
    • SecurityFocus News, October 19
    • Poulsen, K., "California Reports Massive Data Breach," SecurityFocus News, http://www. securityfocus.com/, October 19, 2004
    • (2004)
    • Poulsen, K.1
  • 14
    • 84923237639 scopus 로고    scopus 로고
    • Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows
    • Wo r k s h o p on Secure Knowledge Management, Buffalo, NY, Sep
    • Slagell, A., Wang, J., and Yurcik, W., "Network Log Anonymization: Application of Crypto-PAn to Cisco NetFlows," Wo r k s h o p on Secure Knowledge Management, Buffalo, NY, Sep., 2004
    • (2004)
    • Slagell, A.1    Wang, J.2    Yurcik, W.3
  • 15
    • 77954751856 scopus 로고    scopus 로고
    • Sharing Compuer and Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
    • Technical Report cs.CR/0409005; Sep
    • Slagell, A., and Yurcik, W., "Sharing Compuer and Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization," ACM Computing research Repository (CoRR), Technical Report cs.CR/0409005; Sep., 2004
    • (2004) ACM Computing research Repository (CoRR)
    • Slagell, A.1    Yurcik, W.2
  • 16
    • 33847027721 scopus 로고    scopus 로고
    • Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
    • Athens, Greece, Sep
    • Slagell, A., and Yurcik, W., "Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization," SECOVAL: The Workshop on the Value of Security through Collaboration, Athens, Greece, Sep., 2005
    • (2005) SECOVAL: The Workshop on the Value of Security through Collaboration
    • Slagell, A.1    Yurcik, W.2
  • 17
    • 42549085775 scopus 로고    scopus 로고
    • Sharing Network Logs for Computer Forensics: A New tool for the Anonymization of NetFlow Records
    • Athens, Greece, Sep
    • Slagell, A., Li, Y., and Luo, K., "Sharing Network Logs for Computer Forensics: A New tool for the Anonymization of NetFlow Records," Computer Network Forensics Research Workshop, Athens, Greece, Sep., 2005
    • (2005) Computer Network Forensics Research Workshop
    • Slagell, A.1    Li, Y.2    Luo, K.3
  • 20
    • 1242308060 scopus 로고    scopus 로고
    • On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization
    • San Francisco, CA, Nov
    • Xu, J., Fan, J., Ammar, M. H., and Moon, S. B., "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization," ACM SIGCOMM Internet Measurement Workshop, San Francisco, CA, Nov., 2001
    • (2001) ACM SIGCOMM Internet Measurement Workshop
    • Xu, J.1    Fan, J.2    Ammar, M. H.3    Moon, S. B.4
  • 21
    • 24344436696 scopus 로고    scopus 로고
    • Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme,"
    • Paris, France, Nov
    • Xu, J., Fan, J., Ammar, M. H., and Moon, S. B., "Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme," 10th IEEE International Conference on Network Protocols, Paris, France, Nov., 2002
    • (2002) 10th IEEE International Conference on Network Protocols
    • Xu, J.1    Fan, J.2    Ammar, M. H.3    Moon, S. B.4
  • 22
    • 84899508937 scopus 로고    scopus 로고
    • The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness
    • College Park, MD, Mar
    • Yin, X., Yurcik, W., and Slagell, A., "The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness," First International Workshop on Information Assurance (IWIA), College Park, MD, Mar., 2005
    • (2005) First International Workshop on Information Assurance (IWIA)
    • Yin, X.1    Yurcik, W.2    Slagell, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.