Presentation 2009-06-18
The Modeling of An Anonymity Method for The Widely Distributed Incidents Analysis System
Ryoichi ISAWA, Kota KONDO, Masakatu MORII, Sadako TAKASUKA, Koji NAKAO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L-SOCs capture the network data to analyze local incidents, and send the analysis results to the upper level SOC. The upper level SOC obtains the analysis results including some privacy information obtained by L-SOC, so there are needed to anonymize the privacy information. In this paper, we clarify the anonymity targets and verify their requirements of the anonymity methods, since the targets have different requirements.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Anonymity / Privacy-preserving / Network data sharing / Incident analysis
Paper # IA2009-5,ICSS2009-13
Date of Issue

Conference Information
Committee IA
Conference Date 2009/6/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Internet Architecture(IA)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) The Modeling of An Anonymity Method for The Widely Distributed Incidents Analysis System
Sub Title (in English)
Keyword(1) Anonymity
Keyword(2) Privacy-preserving
Keyword(3) Network data sharing
Keyword(4) Incident analysis
1st Author's Name Ryoichi ISAWA
1st Author's Affiliation CRYPTO CO., LTD()
2nd Author's Name Kota KONDO
2nd Author's Affiliation Graduate School of Engineering, Kobe University
3rd Author's Name Masakatu MORII
3rd Author's Affiliation Graduate School of Engineering, Kobe University
4th Author's Name Sadako TAKASUKA
4th Author's Affiliation CRYPTO CO., LTD
5th Author's Name Koji NAKAO
5th Author's Affiliation National Institute of Information and Communications Technology
Date 2009-06-18
Paper # IA2009-5,ICSS2009-13
Volume (vol) vol.109
Number (no) 85
Page pp.pp.-
#Pages 6
Date of Issue