Paper Abstract and Keywords |
Presentation |
2009-06-18 13:30
* Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L-SOCs capture the network data to analyze local incidents, and send the analysis results to the upper level SOC. The upper level SOC obtains the analysis results including some privacy information obtained by L-SOC, so there are needed to anonymize the privacy information. In this paper, we clarify the anonymity targets and verify their requirements of the anonymity methods, since the targets have different requirements. The specific anonymity method is proposed in [2]. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Anonymity / Privacy-preserving / Network data sharing / Incident analysis / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 109, no. 85, IA2009-5, pp. 25-30, June 2009. |
Paper # |
IA2009-5 |
Date of Issue |
2009-06-11 (IA, ICSS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IA2009-5 ICSS2009-13 |
Conference Information |
Committee |
IA ICSS |
Conference Date |
2009-06-18 - 2009-06-19 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kikai-Shinko-Kaikan Bldg |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Internet Security, etc. |
Paper Information |
Registration To |
IA |
Conference Code |
2009-06-IA-ICSS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
* |
Sub Title (in English) |
|
Keyword(1) |
Anonymity |
Keyword(2) |
Privacy-preserving |
Keyword(3) |
Network data sharing |
Keyword(4) |
Incident analysis |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Ryoichi Isawa |
1st Author's Affiliation |
CRYPTO CO.,LTD (CRYPTO Co., Ltd.) |
2nd Author's Name |
Kota Kondo |
2nd Author's Affiliation |
Kobe University (Kobe Univ.) |
3rd Author's Name |
Masakatu Morii |
3rd Author's Affiliation |
Kobe University (Kobe Univ.) |
4th Author's Name |
Sadako Takasuka |
4th Author's Affiliation |
CRYPTO CO.,LTD (CRYPTO Co., Ltd.) |
5th Author's Name |
Koji Nakao |
5th Author's Affiliation |
National Institute of Information and Communications Technology (NICT) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2009-06-18 13:30:00 |
Presentation Time |
25 minutes |
Registration for |
IA |
Paper # |
IA2009-5, ICSS2009-13 |
Volume (vol) |
vol.109 |
Number (no) |
no.85(IA), no.86(ICSS) |
Page |
pp.25-30 |
#Pages |
6 |
Date of Issue |
2009-06-11 (IA, ICSS) |
|