000 -LEADER |
fixed length control field |
02054nam a22003377a 4500 |
001 - CONTROL NUMBER |
control field |
00006357 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
ES-MaONT |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220119165423.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210208s2021 gr |||fr 0| u|eng u |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978-92-9204-465-7 |
024 ## - OTHER STANDARD IDENTIFIER |
Source of number or code |
DOI |
Standard number or code |
10.2824/860099 |
Additional codes following the standard number or code |
. |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
ES-MaONT |
245 00 - TITLE STATEMENT |
Title |
Data Pseudonymisation |
Remainder of title |
: Advanced Techniques & Use Cases : Technical analysis of cybersecurity measures in data protection and privacy |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Attiki (Greece) : |
Name of publisher, distributor, etc. |
ENISA, |
Date of publication, distribution, etc. |
January 2021 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
55 p. |
Other physical details |
: il., gráf. |
Dimensions |
; 1 documento PDF |
336 ## - CONTENT TYPE |
Content type term |
texto (visual) |
Source |
isbdcontent |
337 ## - MEDIA TYPE |
Media type term |
electrónico |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
recurso en línea |
Source |
rdacarrier |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Este informe, basado en las técnicas básicas de seudónimo, examina soluciones avanzadas para escenarios más complejos que pueden basarse en cifrado asimétrico, firmas de anillo y seudónimos de grupo, modo de encadenamiento, seudónimos basados en múltiples identificadores, seudónimos con prueba de conocimiento y cálculo seguro de múltiples partes. A continuación, aplica algunas de estas técnicas en el ámbito de la atención sanitaria para discutir posibles opciones de pseudonización en diferentes casos de ejemplo. Por último, examina la aplicación de técnicas básicas de pseudonización en casos comunes de uso de la ciberseguridad, como el uso de sistemas de telemetría y reputación. |
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE |
Terms governing use and reproduction |
For any use or reproduction of photos or other material that is not under the ENISA copyright,<br/>permission must be sought directly from the copyright holders.<br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Ciberseguridad y confianza |
9 (RLIN) |
2188 |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
tecnologías de seguridad |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
pseudonización |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
sistemas telemetría |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
mantenimiento |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
seguridad |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
TIC |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
European Union Agency for Network and Information Security |
9 (RLIN) |
2344 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.enisa.europa.eu/publications/data-pseudonymisation-advanced-techniques-and-use-cases">https://www.enisa.europa.eu/publications/data-pseudonymisation-advanced-techniques-and-use-cases</a> |
Link text |
Acceso al documento |
Nonpublic note |
Abierto |
Electronic format type |
pdf |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Informes |
Source of classification or shelving scheme |
|