License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08302.3
URN: urn:nbn:de:0030-drops-17947
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1794/
Go to the corresponding Portal |
Flegel, Ulrich ;
Kerschbaum, Florian ;
Wacker, Richard
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality
Abstract
In this paper we investigate the privacy dimension of collaborative
fraud detection envisioned for outsourcing scenarios. Firstly, we investigate the
privacy requirements derived from privacy law and present the resulting judicial
argument for pseudonymizing audit data generated for the purpose of fraud
detection. Second, we summarize the requirements for such pseudonymization
derived from the requirements of the misuse detection approach for fraud detection.
Third, we describe our approach for pseudonymization of audit data and two
approaches for hiding timestamps in audit data.
BibTeX - Entry
@InProceedings{flegel_et_al:DagSemProc.08302.3,
author = {Flegel, Ulrich and Kerschbaum, Florian and Wacker, Richard},
title = {{Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality}},
booktitle = {Countering Insider Threats},
pages = {1--5},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8302},
editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1794},
URN = {urn:nbn:de:0030-drops-17947},
doi = {10.4230/DagSemProc.08302.3},
annote = {Keywords: Insider threat; occupational fraud; privacy law; PET; logical clocks, pseudonyms,}
}
Keywords: |
|
Insider threat; occupational fraud; privacy law; PET; logical clocks, pseudonyms, |
Collection: |
|
08302 - Countering Insider Threats |
Issue Date: |
|
2008 |
Date of publication: |
|
23.12.2008 |