This HTML5 document contains 39 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n10http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n6http://linked.opendata.cz/ontology/domain/vavai/
n15http://linked.opendata.cz/resource/domain/vavai/zamer/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/kodPristupu/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n9http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F63839172%3A_____%2F06%3A00000506%21RIV07-MSM-63839172/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n8http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n17http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F63839172%3A_____%2F06%3A00000506%21RIV07-MSM-63839172
rdf:type
skos:Concept n6:Vysledek
rdfs:seeAlso
http://www.ist-lobster.org/events/workshop-2006/smotlacha.pdf
dcterms:description
Network packet anonymisation is traditionally undertaken in software, which provides full control over the process, but it consume system resources and has the drawback that system operators still have access to the raw data. By contrast, hardware anonymisation inside the network adapter improves performance and credibility of the anonymization. Network packet anonymisation is traditionally undertaken in software, which provides full control over the process, but it consume system resources and has the drawback that system operators still have access to the raw data. By contrast, hardware anonymisation inside the network adapter improves performance and credibility of the anonymization. Anonymizace paketů je standardně realizována programově, ale toto řešení zatěžuje procesor a ponechává přístup k nezpracovaným datům. Hardwarová anonymizace přímo v monitorovacím adaptéru zvyšuje efektivitu a důvěryhodnost procesu.
dcterms:title
Hardware anonymization Hardwarová anonymizace Hardware anonymization
skos:prefLabel
Hardware anonymization Hardwarová anonymizace Hardware anonymization
skos:notation
RIV/63839172:_____/06:00000506!RIV07-MSM-63839172
n3:aktivita
n4:Z
n3:aktivity
Z(MSM6383917201)
n3:dodaniDat
n17:2007
n3:domaciTvurceVysledku
n10:9250646 n10:5998883 n10:9306293
n3:druhVysledku
n13:A
n3:duvernostUdaju
n18:S
n3:entitaPredkladatele
n9:predkladatel
n3:idSjednocenehoVysledku
477436
n3:idVysledku
RIV/63839172:_____/06:00000506
n3:jazykVysledku
n8:eng
n3:klicovaSlova
packet anonymization; monitoring adapter
n3:klicoveSlovo
n11:monitoring%20adapter n11:packet%20anonymization
n3:kodPristupu
n16:V
n3:kontrolniKodProRIV
[B91C5E951C93]
n3:obor
n14:JC
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:rokUplatneniVysledku
n17:2006
n3:tvurceVysledku
Ubik, Sven Smotlacha, Vladimír Žejdl, Petr
n3:verzeVyzkumneZpravy
II. LOBSTER Workshop, Catania
n3:zamer
n15:MSM6383917201