{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:12:04Z","timestamp":1751951524654},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410850"},{"type":"electronic","value":"9783540399452"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-39945-3_3","type":"book-chapter","created":{"date-parts":[[2007,4,14]],"date-time":"2007-04-14T02:38:33Z","timestamp":1176518313000},"page":"28-48","source":"Crossref","is-referenced-by-count":17,"title":["Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Ulrich","family":"Flegel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,11,11]]},"reference":[{"key":"3_CR1","unstructured":"Kai Rannenberg, Andreas Pfitzmann, and G\u00fcnther M\u00fcller. It security and multilateral security. In Kai Rannenberg, editors Multilateral Security in Communications. Information Security. Addison Wesley, first edition, 1999 M\u00fcller and Rannenberg [38], pages 21\u201329."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Joachim Biskup. Technical enforcement of informational assurances. In Sushil Jajodia, editor, Proceedings of the 12th international IFIP TC11 WG 11.3 Working Conference on Database Security, pages 17\u201340, Chalkidiki, Greece, July 1998. IFIP, Kluwer Academic Publishers.","DOI":"10.1007\/978-0-387-35564-1_2"},{"key":"3_CR3","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, October 1995. http:\/\/europa.eu.int\/eur-lex\/en\/lif\/dat\/1995\/en395L0046.html ."},{"issue":"4","key":"3_CR4","first-page":"258","volume":"84","author":"Erster Senat des Bundesverfassungsgerichts. Urteil vom 15. Dezember 1983 zum Volksz\u00e4hlungsgesetz-1 BvR 209\/83 u.a. (in German)","year":"1984","unstructured":"Erster Senat des Bundesverfassungsgerichts. Urteil vom 15. Dezember 1983 zum Volksz\u00e4hlungsgesetz-1 BvR 209\/83 u.a. (in German). Datenschutz und Datensicherung, 84(4):258\u2013281, April 1984. http:\/\/www.datenschutz-berlin.de\/gesetze\/sonstige\/volksz.htm .","journal-title":"Datenschutz und Datensicherung"},{"key":"3_CR5","unstructured":"Federal data protection act. In Bundesgesetzblatt, page 2954 ff. December 1990. http:\/\/www.datenschutz-berlin.de\/gesetze\/bdsg\/bdsgeng.htm ."},{"key":"3_CR6","unstructured":"Bundesministerium des Inneren. Entwurf zur Anderung des BDSG und anderer Gesetze (in German), July 1999. http:\/\/www.datenschutz-berlin.de\/recht\/de\/bdsg\/bdsgbegr.htm , http:\/\/www.datenschutz-berlin.de\/recht\/de\/bdsg\/bdsg0607.htm ."},{"key":"3_CR7","unstructured":"Bundesministerium f\u00fcr Bildung, Wissenschaft, Forschung und Technologie. Federal act establishing the general conditions for information and communication services \u2014 information and communication services act. Federal Law Gazette I, 52:1870, June 1997. http:\/\/www.iid.de\/iukdg\/gesetz\/iukdgebt.pdf ."},{"key":"3_CR8","unstructured":"Federal Ministry of Posts and Telecommunications. Telecommunications carriers data protection ordinance. Federal Law Gazette I, page 982, July 1996. http:\/\/www.datenschutz-berlin.de\/gesetze\/medien\/tdsve.htm ."},{"key":"3_CR9","unstructured":"Der Deutsche Bundestag. Telecommunications act, July 1996. http:\/\/www.datenschutz-berlin.de\/gesetze\/tkg\/tkge.htm ."},{"key":"3_CR10","unstructured":"Entwurf einer Telekommunikations-Datenschutzverordnung (TDSV) (in German), 1999 December. http:\/\/www.hansen-oest.de\/Dokumente\/dsv-e-9912.pdf ."},{"key":"3_CR11","unstructured":"Directive 97\/66\/EC of the European Parliament and of the Council of 15 december 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector. Official Journal L 024, January 1998. http:\/\/europa.eu.int\/eur-lex\/en\/lif\/dat\/1997\/en397L0066.html ."},{"key":"3_CR12","first-page":"151","volume-title":"Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC\u201997)","author":"M. Sobirey","year":"1997","unstructured":"Michael Sobirey, Simone Fischer-H\u00fcbner, and Kai Rannenberg. Pseudonymous audit for privacy enhanced intrusion detection. In L. Yngstr\u00f6m and J. Carlsen, editors, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC\u201997), pages 151\u2013163, Copenhagen, Denkmark, May 1997. IFIP, Chapman & Hall, London."},{"issue":"5\u20136","key":"3_CR13","first-page":"243","volume":"14","author":"B. Pfitzmann","year":"1990","unstructured":"Birgit Pfitzmann, Michael Waidner, and Andreas Pfitzmann. atRechtssicherheit trotz Anonymi\u00e4t in offenen digitalen Systemen (in German). Datenschutz und Datensicherheit, 14(5\u20136):243\u2013253, 305\u2013315, 1990.","journal-title":"Datenschutz und Datensicherheit"},{"key":"3_CR14","unstructured":"Emilie Lundin and Erland Jonsson. Privacy vs intrusion detection analysis. In Proceedings of the Second International Workshop on the Recent Advances in Intrusion Detection (RAID\u201999) [39]."},{"key":"3_CR15","unstructured":"Emilie Lundin and Erland Jonsson. Some practical and fundamental problems with anomaly detection. In Proceedings of NORDSEC\u201999, Kista Science Park, Sweden, November 1999."},{"key":"3_CR16","unstructured":"Simone Fischer-H\u00fcbner and Klaus Brunnstein. Opportunities and risks of intrusion detection expert systems. In Proceedings of the International IFIP-GI-Conference Opportunities and Risks of Artificial Intelligence Systems ORAIS\u201989, Hamburg, Germany, July 1989. IFIP."},{"key":"3_CR17","unstructured":"Simone Fischer-H\u00fcbner. IDA (Intrusion Detection and Avoidance System): Ein einbruchsentdeckendes und einbruchsvermeidendes System (in German). Informatik. Shaker, first edition, 1993."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Michael Sobirey. Aktuelle Anforderungen an Intrusion Detection-Systeme und deren Ber\u00fccksichtigung bei der Systemgestaltung von AID2 (in German). In Hans H. Br\u00fcggemann and Waltraud Gerhardt-H\u00e4ckl, editors, Proceedings of Verl\u00e4\u00dfliche IT-Systeme, DuD-Fachbeitr\u00e4ge, pages 351\u2013370, Rostock, Germany, April 1995. GI, Vieweg.","DOI":"10.1007\/978-3-322-91094-3_22"},{"key":"3_CR19","first-page":"278","volume-title":"Proceedings of the IFIP TC6\/TC11 International Conference on Communications and Multimedia Security","author":"M. Sobirey","year":"1996","unstructured":"M. Sobirey, B. Richter, and H. K\u00f6nig. The intrusion detection system AID-Architecture and experiences in automated audit trail analysis. In P. Horster, editor, Proceedings of the IFIP TC6\/TC11 International Conference on Communications and Multimedia Security, pages 278\u2013290, Essen, Germany, September 1996. IFIP, Chapman & Hall, London."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Michael Sobirey. Datenschutzoruientiertes Intrusion Detection (in German). DuD-Fachbeitr\u00e4ge. Vieweg, first edition, 1999.","DOI":"10.1007\/978-3-322-86850-3_3"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Michael Meier and Thomas Holz. Sicheres Schl\u00fcsselmanagement f\u00fcr verteilte Intrusion-Detection-Systeme (in German). In Patrick Horster, editor, System-sicherheit, DuD-Fachbeitr\u00e4ge, pages 275\u2013286, Bremen, Germany, March 2000. GI-2.5.3, ITG-6.2, OCG\/ACS, TeleTrusT, Vieweg.","DOI":"10.1007\/978-3-322-84957-1_22"},{"key":"3_CR22","unstructured":"Roland B\u00fcschkes and Dogan Kesdogan. Privacy enhanced intrusion detection. In Kai Rannenberg, editors. Multilateral Security in Communications. Information Security. Addison Wesley, first edition, 1999 M\u00fcller and Rannenberg [38], pages 187\u2013204."},{"key":"3_CR23","unstructured":"Terry Escamilla. Intrusion Detection: Network Security Beyond the Firewall. Wiley Computer Publishing. John Wiley & Sons, Inc., first edition, 1998."},{"key":"3_CR24","unstructured":"Katherine E. Price. Host-based misuse detection and conventional operating systems\u2019 audit data collection. Master\u2019s thesis, Purdue university, December 1997."},{"key":"3_CR25","unstructured":"National Computer Security Center. US DoD Standard: Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, Supercedes CSC-STD-001-83, dtd 15 Aug 83, Library No. S225,711, December 1985. http:\/\/csrc.ncsl.nist.gov\/secpubs\/rainbow\/std001.txt ."},{"key":"3_CR26","unstructured":"National Computer Security Center. Audit in trusted systems. NCSC-TG-001, Library No. S-228,470, July 1987. http:\/\/csrc.ncsl.nist.gov\/secpubs\/rainbow\/tg001.txt ."},{"key":"3_CR27","unstructured":"Common Criteria Implementation Board, editor. Common Criteria for Information Technology Security Evaluation \u2014 Part 2: Security functional requirements, Version 2.1. Number CCIMB-99-032. National Institute of Standards and Technology, August 1999. http:\/\/csrc.ncsl.nist.gov\/cc\/ccv20\/p2-v21.pdf ."},{"key":"3_CR28","unstructured":"Inc. Sun Microsystems. Solaris 2.6 System Administrator Collection, volume 1, chapter SunSHIELD Basic Security Module Guide. Sun Microsystems, Inc., 1997."},{"key":"3_CR29","unstructured":"Rebecca Gurley Bace. Intrusion Detection. Macmillan Technical Publishing, first edition, 2000."},{"key":"3_CR30","volume-title":"Technical Report 93076","author":"H. Debar","year":"1998","unstructured":"Herv\u00e9 Debar, Marc Dacier, and Andreas Wespi. Towards a taxonomy of intrusiondetection systems. Technical Report 93076, IBM Research Division, Zurich Research Laboratory, 8803 R\u00fcschlikon, Switzerland, June 1998."},{"key":"3_CR31","unstructured":"Darren Reed. Ip filter. http:\/\/coombs.anu.edu.au\/avalon\/ip-filter.html , 1999."},{"key":"3_CR32","volume-title":"Technical report","author":"S. E. Smaha","year":"1994","unstructured":"Stephen E. Smaha. svr4++, A common audit trail interchange format for Unix. Technical report, Haystack Laboratories, Inc., Austin, Texas, October 1994. Version 2.2."},{"key":"3_CR33","unstructured":"Matt Bishop. A standard audit trail format. In Proceedings of the 18th National Information Systems Security Conference, pages 136\u2013145, Baltimore, Maryland, October 1995."},{"key":"3_CR34","unstructured":"Stefan Axelsson, Ulf Lindquist, and Ulf Gustafson. An approach to unix security logging. In Proceedings of the 21st National Information Systems Security Conference, pages 62\u201375, Crystal City, Arlington, VA, October 1998."},{"key":"3_CR35","unstructured":"Douglas Robert Stinson. Cryptography \u2014 Theory and Practice, chapter Secret Sharing Schemes, pages 326\u2013331. Discrete mathematics and its applications. CRC Press, first edition, 1995."},{"key":"3_CR36","unstructured":"Bruce Schneier and John Kelsey. Cryptographic support for secure logs on untrusted machines. In Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection (RAID\u201998), Lovain-la-Neuve, Belgium, September 1998. IBM Emergency Response Team. http:\/\/www.zurich.ibm.com\/~dac\/ProgRAID98\/Tableof content.html ."},{"key":"3_CR37","unstructured":"John Kelsey and Bruce Schneier. Minimizing bandwidth for remote access to cryptographically protected audit logs. In Proceedings of the Second International Workshop on the Recent Advances in Intrusion Detection (RAID\u201999) [39]."},{"key":"3_CR38","unstructured":"G\u00fcnter M\u00fcller and Kai Rannenberg, editors. Multilateral Security in Communications. Information Security. Addison Wesley, first edition, 1999."},{"key":"3_CR39","unstructured":"Purdue University, CERIAS. Proceedings of the Second International Workshop on the Recent Advances in Intrusion Detection (RAID\u201999), West Lafayette, Indiana, September 1999."}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39945-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T05:35:04Z","timestamp":1556343304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39945-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410850","9783540399452"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/3-540-39945-3_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}