dc.contributor.author | Khan, Muhammad Imran | |
dc.contributor.author | Foley, Simon N. | |
dc.contributor.author | O'Sullivan, Barry | |
dc.date.accessioned | 2021-03-05T10:34:55Z | |
dc.date.available | 2021-03-05T10:34:55Z | |
dc.date.created | 2020-10-28T13:26:39Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Procedia Computer Science. 2020, 175 331-339. | en_US |
dc.identifier.issn | 1877-0509 | |
dc.identifier.uri | https://hdl.handle.net/11250/2731808 | |
dc.description.abstract | In this paper a notion of privacy-anomaly detection is presented where normative privacy is modelled using k-anonymity. Based on the model, normative privacy-profiles are constructed, and deviation from normative privacy-profile at runtime is labelled as a privacy-anomaly. Furthermore, the paper investigates whether there is a correlation between security-anomalies and privacy-anomalies, that is, whether the privacy-anomalies labelled by privacy-anomaly detection system are detected by conventional security-anomaly detection system used for detecting malicious accesses to databases by insiders. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Elsevier | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/deed.no | * |
dc.title | Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | publishedVersion | en_US |
dc.source.pagenumber | 331-339 | en_US |
dc.source.volume | 175 | en_US |
dc.source.journal | Procedia Computer Science | en_US |
dc.identifier.doi | 10.1016/j.procs.2020.07.048 | |
dc.identifier.cristin | 1842950 | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |