版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
TABLEOFCONTENTS
1.INTRODUCTION7
1.1BACKGROUND7
1.2OBJECTIVES8
1.3OUTLINE9
2.PSEUDONYMISATIONBASICS10
2.1PSEUDONYMISATIONSCENARIOS10
2.2PSEUDONYMISATIONTECHNIQUESANDPOLICIES12
3.ADVANCEDPSEUDONYMISATIONTECHNIQUES14
3.1ASYMMETRICENCRYPTION14
3.2RINGSIGNATURESANDGROUPPSEUDONYMS16
3.3CHAININGMODE18
3.4PSEUDONYMSBASEDONMULTIPLEIDENTIFIERSORATTRIBUTES19
3.5PSEUDONYMSWITHPROOFOFOWNERSHIP21
35.1Zero-KnowledgeProof22
3.6SECUREMULTIPARTYCOMPUTATION23
3.7SECRETSHARINGSCHEMES25
3.8CONCLUSION26
4.PSEUDONYMISATIONUSECASESINHEALTHCARE27
4.1EXAMPLESCENARIO27
4.2PSEUDONYMISATIONUSECASES28
42.1Patientrecordcomparisonuse-case28
422Medicalresearchinstitutionuse-case30
423Distributedstorageuse-case31
4.3ADVANCEDPSEUDONYMISATIONSCENARIO:THEDATACUSTODIANSHIP32
43.1Notionofdatacustodianship32
432PersonalInformationManagementSystem(PIMS)asdatacustodian34
43.3Datacustodianasapartofthehospital34
43.4Datacustodianasanindependentorganisation35
43.5Interconnecteddatacustodiannetwork36
5.PSEUDONYMISATIONUSECASESINCYBERSECURITY38
5.1THEROLEANDSCOPEOFSECURITYTELEMETRY38
5.2AUSECASEONREPUTATIONSYSTEMTRAININGANDUSER-TAILOREDPROTECTION39
521Entitiesandroles39
522FileReputation40
523URLReputation42
5.3USECASESONSECURITYOPERATIONSANDCUSTOMERSUPPORTCENTRES43
53.1SecurityOperationsCenters43
532Consumercustomersupport44
53.3Protectiongapandreal-timeprotection46
5.4ADDITIONALCYBERSECURITYUSECASES46
6.CONCLUSIONSANDRECOMMENDATIONS47
7.REFERENCES50
EXECUTIVESUMMARY
Pseudonymisationisanestablishedandaccepteddataprotectionmeasurethathasgained
additionalattentionfollowingtheadoptionoftheGeneralDataProtectionRegulation(GDPR)1
whereitisbothspecificallydefinedandmanytimesreferencedasasafeguard.
ENISA,initspriorworkonthisfield,hasexploredthenotionandscopeofdata
pseudonymisation,whilepresentingsomebasictechnicalmethodsandexamplestoachieve
pseudonymisationinpractice.Inthisnewreport,ENISAcomplementsitspastworkby
discussingadvancedpseudonymisationtechniques,aswellasspecificusecasesfromthe
specificsectorsofhealthcareandcybersecurity.Inparticular,thereport,buildingonthebasic
pseudonymisationtechniques,examinesadvancedsolutionsformorecomplexscenariosthat
canbebasedonasymmetricencryption,ringsignaturesandgrouppseudonyms,chaining
mode,pseudonymsbasedonmultipleidentifiers,pseudonymswithproofofknowledgeand
securemulti-partycomputation.Itthenappliessomeofthesetechniquesintheareaof
healthcaretodiscusspossiblepseudonymisationoptionsindifferentexamplecases,whilealso
exploringthepossibleapplicationofthedatacustodianshipmodel.Lastly,itexaminesthe
applicationofbasicpseudonymisationtechniquesincommoncybersecurityusecases,suchas
theuseoftelemetryandreputationsystems.
Basedontheanalysisprovidedinthereport,thefollowingbasicconclusionsand
recommendationsforallrelevantstakeholdersareprovided.
Definingthebestpossibletechnique
AsithasbeenstressedalsoinpastENISA'sreports,thereisnofit-for-allpseudonymisation
techniqueandadetailedanalysisofthecaseinquestionisnecessaryinordertodefinethebest
possibleoption.Todoso,itisessentialtotakeacriticaltolookintothesemantics(the"full
picture”)beforeconductingdatapseudonymisation.Inaddition,pseudonymisationisonlyone
possibletechniqueandmustbecombinedwithathoroughsecurityriskassessmentforthe
protectionofpersonaldata.
Datacontrollersandprocessorsshouldengageindatapseudonymisation,basedonasecurity
anddataprotectionriskassessmentandtakingdueaccountoftheoverallcontextand
characteristicsofpersonaldataprocessing.Thismayalsocomprisemethodsfordatasubjectsto
pseudonymisepersonaldataontheirside(e.g.beforedeliveringdatatothecontroller/processor)
toincreasecontroloftheirownpersonaldata.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard)should
promoterisk-baseddatapseudonymisationthroughtheprovisionofrelevantguidanceand
examples.
1Regulation(EU)2016/679oftheEuropeanParliamentandoftheCouncilof27April2016ontheprotectionofnaturalpersons
withregardtotheprocessingofpersonaldataandonthefreemovementofsuchdata,andrepealingDirective95/46/EC(General
DataProtectionRegulation)https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
Advancedtechniquesforadvancedscenarios
Whilethetechnicalsolutionisacriticalelementforachievingproperpseudonymisation,one
mustnotforgetthattheorganisationalmodelanditsunderlyingstructuralarchitecturearealso
veryimportantparametersofsuccess.Advancedtechniquesgotogetherwithadvanced
scenarios,suchasthecaseofthedatacustodianshipmodel.
Datacontrollersandprocessorsshouldconsiderpossiblescenariosthatcansupportadvanced
pseudonymisationtechniques,based-amongother-ontheprincipleofdataminimisation.
Theresearchcommunityshouldsupportdatacontrollersandprocessorsinidentifyingthe
necessarytrustelementsandguaranteesfortheadvancedscenarios(e.g.datacustodianship)
tobefunctionalinpractice.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard)should
ensurethatregulatoryapproaches,e.g.asregardsnewtechnologiesandapplicationsectors,
takeintoaccountallpossibleentitiesandrolesfromthestandpointofdataprotection,while
remainingtechnologicallyneutral.
Establishingthestate-of-the-art
Althoughalotofworkisalreadyinplace,thereiscertainlymoretobedoneindefiningthestate-
of-the-artindatapseudonymisation.Tothisend,researchandapplicationscenariosmustgo
hand-in-hand,involvingallrelevantparties(researchers,industry,andregulators)todiscuss
joinedapproaches.
TheEuropeanCommission,therelevantEUinstitutions,aswellasRegulators(e.g.Data
ProtectionAuthoritiesandtheEuropeanDataProtectionBoard)shouldsupporttheestablishment
andmaintenanceofthestate-of-the-artinpseudonymisation,bringingtogetherallrelevant
stakeholdersinthefield(regulators,researchcommunity,andindustry).
Theresearchcommunityshouldcontinueitseffortsonadvancingtheexistingworkondata
pseudonymisation,addressingspecialchallengesappearingfromemergingtechnologies,such
asArtificialIntelligence.TheEuropeanCommissionandtherelevantEUinstitutionsshould
supportanddisseminatetheseefforts.
Towardsthebroaderadoptionofdatapseudonymisation
Recentdevelopments,e.g.ininternationalpersonaldatatransfers,showclearlytheneedto
furtheradvanceappropriatesafeguardsforpersonaldataprotection.Thiswillonlybeintensified
inthefuturebytheuseofemergingtechnologiesandtheneedforopendataaccess.Itis,thus,
importanttostarttodaythediscussiononthebroaderadoptionofpseudonymisationindifferent
applicationscenarios.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard),the
EuropeanCommissionandtherelevantEUinstitutionsshoulddisseminatethebenefitsofdata
pseudonymisationandprovideforbestpracticesinthefield.
1.INTRODUCTION
Pseudonymisationisanestablishedandaccepteddataprotectionmeasurethathasgained
additionalattentionfollowingtheadoptionoftheGeneralDataProtectionRegulation(GDPR),
whereitisbothspecificallydefined(Article4(5)GDPR)2andmanytimesreferencedasa
safeguard.Technicalandorganisationalmeasures,inparticularforsecurityanddataprotection
bydesign,comprisepseudonymisation.Theapplicationofpseudonymisationtopersonaldata
canreducetheriskstothedatasubjectsconcernedandhelpcontrollersandprocessorsmeet
theirdataprotectionobligations.Nevertheless,noteveryso-calledpseudonymisation
mechanismfulfilsthedefinitionoftheGDPR,andpseudonymisationtechniquesthatmaywork
inonespecificcasetoachievedataprotection,maynotbesufficientinothercases3.Still,the
basicconceptofsubstitutingidentifyingdatawithpseudonymscancontributetoreducingdata
protectionrisks.
1.1BACKGROUND
Giventhegrowingimportanceofpseudonymisationforbothdatacontrollersanddatasubjects,
ENISAhasbeenworkingoverthepastyearsonthistopic,inco-operationwithexpertsand
nationalregulatoryauthorities.Indeed,ENISAissueditsfirstrelevantreportinJanuary2019
(ENISA,2019-1)presentinganoverviewofthenotionandmaintechniquesof
pseudonymisationincorrelationwithitsnewroleundertheGDPR.AsecondENISAreport
followedinNovember2019(ENISA,2019-2)withamoredetailedanalysisofthetechnical
methodsandspecificexamplesandbestpracticesforparticulardatasets,i.e.emailaddresses,
IPaddressesandmorecomplexdatasets.Inaddition,adedicatedworkshopon
pseudonymisation4wasco-organisedbyENISAandtheDataProtectionAuthorityofthe
GermanFederalStateofSchleswig-Holstein(ULD)inNovember2019inordertoexchange
informationandexperienceamongkeystakeholders5.
Whileworkandregulatoryguidanceinthefieldisgrowing6,itisapparentthatfurthereffortis
needed,especiallyaddressingspecificapplicationscenariosanddifferenttypesofdatasets.
BothENISA'sreportsandtheconclusionsoftheULD-ENISAworkshopleadtowardsthis
direction,whichcouldeventuallysupportthedevelopmentofMacatalogueoftechniques"ora
,,cookbookntowardsapplyingpseudonymisationinpracticeindifferentapplicationscenarios.
2IIhastobenotedthatpersonaldatathathasbeenpseudonymisedisstillregardedas"personaldata"pursuanttoArticle4(1)
GDPRandmustnotbeconfusedwith"anonymiseddata"whereitisnolongerpossibleforanyonetoreferbacktoindividualdata
subjects,seeRecital28GDPR.
3Inordertofullyunderstandtheroleofpseudonymisationfortheprocessingofpersonaldata,afullanalysisofthelegalsituation
inthespecificcasewouldalsoberequired.
Fortheassessmentofconcreteprocessingoperations,controllersandprocessorsmusttakeaccountofallfactorsplayingarole
fortherisktothefundamentalrightsofindividualsinducedbytheprocessingassuchandbypotentialbreachesofsecurity,also
goingbeyondtechnicalandorganisationalmeasuresconsideredinthisstudy.
https://www.enisa.europa.eu/events/uld-enisa-workshop/uld-enisa-workshop-pseudonymization-and-relevant-security-
technologies
https://www.enisa.europa.eu/events/uld-enisa-workshop/uld-enisa-workshop-notes/view
6SeealsoEDPSandSpanishDPAjointpaperontheintroductionofhashaspseudonymisationtechnique,
https://edps.europa.eu/data-protection/our-workypublications/papers/introduction-hash-function-personal-data.en
Shouldthisbeachieved,itwouldbeasignificantsteptowardsthedefinitionofthestate-of-the-
artforpseudonymisationtechniques.
AgainstthisbackgroundandfollowingpreviousrelevantENISA'swork7,theAgencydecided
underits2020work-programmetoelaboratefurtheronthepracticalapplicationofdata
pseudonymisationtechniques.
1.2OBJECTIVES
TheoverallscopeofthisreportistocontinuepastENISA'sworkbyproviding(onthebasisof
thepreviousanalysis)specificusecasesforpseudonymisation,alongwithmoreadvanced
techniquesandscenariosthatcansupportitspracticalimplementationbydatacontrollersor
processors.
Morespecifically,theobjectivesofthereportareasfollows:
•Explorefurtheradvancedpseudonymisationtechniqueswhichwerenotcoveredin
priorENISA*swork,basedoncryptographicalgorithmsandprivacyenhancing
technologies.
•Discussspecificapplicationusecaseswherepseudonymisationcanbeapplied,
analysingtheparticularscenarios,rolesandtechniquesthatcouldbeofinterestineach
case.Inparticular,forthescopeofthereport,usecasesarepresentedintwodifferent
sectors:(a)healthcareinformationexchange;(b)cybersecurityinformationexchange
withtheuseofinnovativetechnologies(e.g.machinelearningtechnologies).
Itshouldbenotedthattheselectionoftheusecaseswasbasedonthefactthatthespecific
sectors(healthcare,cybersecurity)representquitecommoncasesfortheapplicationof
pseudonymisationinseveralreal-lifesituations.Atthesametime,theselectedusecasesalso
reflectdiverserequirementswithregardtopseudonymisation,e.g.intermsofthe
scenarios/rolesinvolved,aswellasintermsofthetechniquesthatcouldbeappliedinpractice.
Thetargetaudienceofthereportconsistsofdatacontrollers,dataprocessorsand
manufacturers/producersofproducts,servicesandapplications,DataProtectionAuthorities
(DPAs),aswellasanyotherinterestedpartyindatapseudonymisation.
Thedocumentassumesabasiclevelofunderstandingofpersonaldataprotectionprinciplesand
therole/processofpseudonymisation.ForanoverviewofdatapseudonymisationunderGDPR,
pleasealsorefertorelevantENISA'sworkinthefield(ENISA,2019-1)&(ENISA,2019
-2).
Thediscussionandexamplespresentedinthereportareonlyfocusedontechnicalsolutions
thatcouldpromoteprivacyanddataprotection;theyshouldbynomeansbeinterpretedasa
legalopinionontherelevantcases.
https://www.enisa.europa.eu/topics/data-protection/privacy-by-design
1.3OUTLINE
Theoutlineoftheremainingpartofthereportisasfollows:
•Chapter2providesanoverviewofthebasicscenarios,pseudonymisationtechniques
andpoliciesdiscussedunder(ENISA,2019-2).
•Chapter3presentsanumberofadvancedpseudonymisationtechniques,including
asymmetricencryption,ringsignatures,chainingmode,Merkletrees,pseudonymswith
prooforownership,securemultipartycomputationandsecretsharingschemes.
•Chapter4analysespseudonymisationtechniquesandapplicationscenariosinthe
areaofhealthcare.Itparticularlyfocusesontheuseofthetree-basedpseudonyms
approachandthedatacustodianshipmodel.
•Chapter5discussestheapplicationofpseudonymisationinthebroaderareaof
cybersecuritytechnologies.
•Chapter6summarisesthepreviousdiscussionsandprovidesthemainconclusions
andrecommendationsforallrelatedstakeholders.
ThisreportispartoftheworkofENISAintheareaofprivacyanddataprotection8,which
focusesonanalysingtechnicalsolutionsfortheimplementationofGDPR,privacybydesignand
securityofpersonaldataprocessing.
https://www.enisa.europa.eu/topics/data-protection
2.PSEUDONYMISATIONBASICS
Asmentionedin(ENISA,2019-2),themostobviousbenefitofpseudonymisationistohidethe
identityofthedatasubjectsfromanythirdparty(otherthanthePseudonymisationEntity,i.e.the
entityresponsibleforpseudonymisation).Still,pseudonymisationcangobeyondhidingreal
identitiesanddataminimisationintosupportingthedataprotectiongoalofunlinkabilityand
contributingtowardsdataaccuracy.
Whenimplementingpseudonymisation,itisimportanttoclarifyasafirststeptheapplication
scenarioandthedifferentrolesinvolved,inparticulartheroleofthePseudonymisationEntity
(PE),whichcanbeattributedtodifferententities(e.g.adatacontroller,adataprocessor,a
TrustedThirdPartyorthedatasubject),dependingonthecase.Underaspecificscenario,itis
thenrequiredtoconsiderthebestpossiblepseudonymisationtechniqueandpolicythatcanbe
applied,giventhebenefitsandpitfallsthateachoneofthosetechniquesorpoliciesentails.
Obviously,thereisnotaone-size-fits-allapproachandriskanalysisshouldinallcasesbe
involved,consideringprivacyprotection,utility,scalability,etc.
Inthatregard,thisChapterprovidesabriefoverviewofthebasicpseudonymisationscenarios
andtechniques,astheseareoutlinedin(ENISA,2019-2),whichw川bethenfurther
complementedandanalysedinthenextChaptersofthereport.
2.1PSEUDONYMISATIONSCENARIOS
Sixdifferentpseudonynimisationscenariosarediscussedin(ENISA,2019-2)andare
presentedinFigure1below.Thedefiningdifferencebetweenthescenariosisfirstlytheactor
whotakestheroleofthePseudonymisationEntity(PE)andsecondlytheotherpotentialactors
thatmaybeinvolved(andtheirroles).
Clearly,inallthreefirstscenariosinFigure1,thedatacontrolleristhePE,eitheractingalone
(scenario1)orinvolvingaprocessorbeforepseudonymisation(scenario2)orafter
pseudonymisation(scenario3).Inscenario4,thePEistheprocessorthatperforms
pseudonymisationonbehalfofthecontroller(thus,controllermaintainingstillcontroloverthe
originaldata).Scenario5setsaTrustedThirdPartyentity,outsidethecontrolofthedata
controller,asPE,thereforeinvolvinganintermediarytosafeguardthepseudonymisation
process.Lastly,scenario6providesfordatasubjectstobethePEand,thus,controlan
importantpartofthepseudonymisationprocess.
Laterinthisreportwewillexplorethepracticalapplicationofthesescenariosinspecificcases,
especiallyscenarios1and3undercybersecurityusecases(Chapter5)andscenarios5and6
underhealthcareusecases(Chapter4).Forthescenario5particularlywewillfurtherdetailthe
notionoftheTrustedThirdParty(datacustodian)andtheformsthatitcouldtakeinthe
healthcaresector.
Figure1:Basicpseudonymisationscenarios
PseudonymlsatlonScenario1
DATACONTROLLER&DATACONTROLLER&
DATADATAPSEUDONYMISATIONDATAPSEUDONYMISATIONDATA
SUBJECTSPROCESSORENTITYSUBJECTSENTITYCONTROLLER
BetaInc.AlphaCorp.AlphaCorp.BetaInc.
PseudonymisationSecretPseudonymisationSecret
IdentifierPseudonymIdentifierPseudonym
Alice15Alice15
Bob28Bob28
Charly3Charly3
PscudonymiMtlonScenario2PseudonymisationScenario3
DATADATA
CONTROLLERCONTROLLER
AlphaCorp.AlphaCorp.
PseudonyvniMtionScvnario4PieudonyniisationScenario5
taeudon^vrikMtlonSecret
Alice15
IdtnclfltrPMiid❹nyni
Hob28
Charly3
PseudonymlMtlonScenario6
2.2PSEUDONYMISATIONTECHNIQUESANDPOLICIES
Thebasicpseudonymisationtechniquesthatcanbeappliedinpractice,asalsodiscussedin
(ENISA,2019-2)areasfollows:
•Counter:thesimplestpseudonymisationfunction,wheretheidentifiersaresubstituted
byanumberchosenbyamonotoniccounter.Itsadvantagesrestwithitssimplicity,
whichmakeitagoodcandidateforsmallandnotcomplexdatasets.Itprovidesfor
pseudonymswithnoconnectiontotheinitialidentifiers(althoughthesequential
characterofthecountercanstillprovideinformationontheorderofthedatawithina
dataset).However,thesolutionmayhaveimplementationandscalabilityissuesin
casesoflargeandmoresophisticateddatasets.
•RandomNumberGenerator(RNG):asimilarapproachtothecounterwiththe
differencethatarandomnumberisassignedtotheidentifier.Itprovidesstrongdata
protection(as,contrarytothecounter,arandomnumberisusedtocreateeach
pseudonym,thusitisdifficulttoextractinformationregardingtheinitialidentifier,
unlessthemappingtableiscompromised).Collisions,however,maybeanissue9,as
wellasscalability,dependingontheimplementationscenario.
•Cryptographichashfunction:directlyappliedtoanidentifiertoobtainthe
correspondingpseudonymwiththepropertiesofbeinga)one-wayandb)collision
free10.Whileahashfunctioncansignificantlycontributetowardsdataintegrity,itis
generallyconsideredweakasapseudonymisationtechnique,asitispronetobrute
forceanddictionaryattacks(ENISA,2019-2).
•Messageauthenticationcode(MAC):similartoacryptographichashfunctionexcept
thatasecretkeyisintroducedtogeneratethepseudonym.Withouttheknowledgeof
thiskey,itisnotpossibletomaptheidentifiersandthepseudonyms.MACisgenerally
consideredasarobustpseudonymisationtechniquefromadataprotectionpointof
view.Recoverymightbeanissueinsomecases(i.e.iftheoriginalidentifiersarenot
beingstored).Differentvariationsofthemethodmayapplywithdifferentutilityand
scalabilityrequirements.HMAC(Bellare,Canetti,&Krawczyk,1996)isbyfarthemost
populardesignofmessageauthenticationcodeusedinInternetprotocols.
•Symmetricencryption:theblockcipherisusedtoencryptanidentifierusingasecret
key,whichisboththepseudonymisationsecretandtherecoverysecret.Usingblock
ciphersforpseudonymisationrequirestodealwiththeblocksize.Symmetricencryption
isarobustpseudonymisationtechnique,withseveralpropertiesbeingsimilartoMAC
(i.e.theaforementionedpropertiesofthesecretkey).Onepossibleissueintermsof
dataminimisationisthatthePEcanalwaysreversethepseudonyms,evenifthereis
noneedtostoretheinitialindividuals'identifiers.
9Still,itshouldbenotedthatcryptography-basedconstructionsofpseudo-randomnumbergeneratorsareavailable,whichcan
avoidcollisionsiftheyareproperlyconfiguredandcouldbepossiblysimilarlyusedtoprovidepseudonyms(e.g.discretelogarithm
basedconstructions(Blum,Feldman,&Micali,1984).
10Thisholdsundertheassumptionthatacryptographicallystronghashfunctionisused.Moreover,itisessentialthathashing
shouldbeappliedtoappropriateindividual'sidentifiers(e.g.hashingthefirstnameandlastnamemaynotavoidcollisions,ifthis
combinationdoesnotconstituteanidentifierinaspecificcontext-i.e.theremaybetwoindividualswiththesamefistnameand
lastname).Moredetailsaregivenin(ENISA,2019-1)(ENISA,2019-2).
Independentlyofthechoiceofthetechnique,thepseudonymisationpolicy(i.e.thepractical
implementationofthetechnique)isalsocriticaltotheimplementationinpractice.Threedifferent
pseudonymisationpolicieshavebeenconsideredtothatend:
•Deterministicpseudonymisation:inallthedatabasesandeachtimeitappears,Idis
alwaysreplacedbythesamepseudonympseudo.
•Documentrandomisedpseudonymisation:eachtimeIdappearsinadatabase,itis
substitutedwithadifferentpseudonym(pseudoi,pseudo2i...)-,however,Idisalways
mappedtothesamecollectionof(pseudoi,pseudo^inthedatasetAandB.
•Fullyrandomisedpseudonymisation:foranyoccurrencesofIdwithinada
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 江西省九江市武宁尚美中学2024-2025学年高二上学期开学英语试题(原卷版)
- 2024年亚太发行商游戏应用市场洞察分析报告
- 西师版一年级数学上册全册教案
- 人教版一年级上册数学全册教案表格式
- 2022《心系国防共筑和谐家园》参考演讲稿
- 建筑工程计量与计价课程设计任务书
- 《机械制造工艺学》试题库及答案二
- 企业级安全培训试题(基础题)
- 公司管理人员安全培训试题及完整答案一套
- 厂级职工安全培训试题附答案(考试直接用)
- 1球磨机衬板更换方案修改
- 中药饮片养护记录表一个月
- 无铅喷锡SMT上锡不良的几种分析思路
- 《充分条件与必要条件》课件1
- 日语自我介绍写法及例ppt课件
- 月考勤表excel模板
- 圆形分布资料的统计分布
- 基于MATLAB的滚珠丝杠动力学建模与仿真分析
- 生产能力证明办理流程生产能力证明办理
- 劳动关系管理标准流程
- 饲料厂总体试车方案
评论
0/150
提交评论