版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
TABLEOFCONTENTS
1.INTRODUCTION7
1.1BACKGROUND7
1.2OBJECTIVES8
1.3OUTLINE9
2.PSEUDONYMISATIONBASICS10
2.1PSEUDONYMISATIONSCENARIOS10
2.2PSEUDONYMISATIONTECHNIQUESANDPOLICIES12
3.ADVANCEDPSEUDONYMISATIONTECHNIQUES14
3.1ASYMMETRICENCRYPTION14
3.2RINGSIGNATURESANDGROUPPSEUDONYMS16
3.3CHAININGMODE18
3.4PSEUDONYMSBASEDONMULTIPLEIDENTIFIERSORATTRIBUTES19
3.5PSEUDONYMSWITHPROOFOFOWNERSHIP21
35.1Zero-KnowledgeProof22
3.6SECUREMULTIPARTYCOMPUTATION23
3.7SECRETSHARINGSCHEMES25
3.8CONCLUSION26
4.PSEUDONYMISATIONUSECASESINHEALTHCARE27
4.1EXAMPLESCENARIO27
4.2PSEUDONYMISATIONUSECASES28
42.1Patientrecordcomparisonuse-case28
422Medicalresearchinstitutionuse-case30
423Distributedstorageuse-case31
4.3ADVANCEDPSEUDONYMISATIONSCENARIO:THEDATACUSTODIANSHIP32
43.1Notionofdatacustodianship32
432PersonalInformationManagementSystem(PIMS)asdatacustodian34
43.3Datacustodianasapartofthehospital34
43.4Datacustodianasanindependentorganisation35
43.5Interconnecteddatacustodiannetwork36
5.PSEUDONYMISATIONUSECASESINCYBERSECURITY38
5.1THEROLEANDSCOPEOFSECURITYTELEMETRY38
5.2AUSECASEONREPUTATIONSYSTEMTRAININGANDUSER-TAILOREDPROTECTION39
521Entitiesandroles39
522FileReputation40
523URLReputation42
5.3USECASESONSECURITYOPERATIONSANDCUSTOMERSUPPORTCENTRES43
53.1SecurityOperationsCenters43
532Consumercustomersupport44
53.3Protectiongapandreal-timeprotection46
5.4ADDITIONALCYBERSECURITYUSECASES46
6.CONCLUSIONSANDRECOMMENDATIONS47
7.REFERENCES50
EXECUTIVESUMMARY
Pseudonymisationisanestablishedandaccepteddataprotectionmeasurethathasgained
additionalattentionfollowingtheadoptionoftheGeneralDataProtectionRegulation(GDPR)1
whereitisbothspecificallydefinedandmanytimesreferencedasasafeguard.
ENISA,initspriorworkonthisfield,hasexploredthenotionandscopeofdata
pseudonymisation,whilepresentingsomebasictechnicalmethodsandexamplestoachieve
pseudonymisationinpractice.Inthisnewreport,ENISAcomplementsitspastworkby
discussingadvancedpseudonymisationtechniques,aswellasspecificusecasesfromthe
specificsectorsofhealthcareandcybersecurity.Inparticular,thereport,buildingonthebasic
pseudonymisationtechniques,examinesadvancedsolutionsformorecomplexscenariosthat
canbebasedonasymmetricencryption,ringsignaturesandgrouppseudonyms,chaining
mode,pseudonymsbasedonmultipleidentifiers,pseudonymswithproofofknowledgeand
securemulti-partycomputation.Itthenappliessomeofthesetechniquesintheareaof
healthcaretodiscusspossiblepseudonymisationoptionsindifferentexamplecases,whilealso
exploringthepossibleapplicationofthedatacustodianshipmodel.Lastly,itexaminesthe
applicationofbasicpseudonymisationtechniquesincommoncybersecurityusecases,suchas
theuseoftelemetryandreputationsystems.
Basedontheanalysisprovidedinthereport,thefollowingbasicconclusionsand
recommendationsforallrelevantstakeholdersareprovided.
Definingthebestpossibletechnique
AsithasbeenstressedalsoinpastENISA'sreports,thereisnofit-for-allpseudonymisation
techniqueandadetailedanalysisofthecaseinquestionisnecessaryinordertodefinethebest
possibleoption.Todoso,itisessentialtotakeacriticaltolookintothesemantics(the"full
picture”)beforeconductingdatapseudonymisation.Inaddition,pseudonymisationisonlyone
possibletechniqueandmustbecombinedwithathoroughsecurityriskassessmentforthe
protectionofpersonaldata.
Datacontrollersandprocessorsshouldengageindatapseudonymisation,basedonasecurity
anddataprotectionriskassessmentandtakingdueaccountoftheoverallcontextand
characteristicsofpersonaldataprocessing.Thismayalsocomprisemethodsfordatasubjectsto
pseudonymisepersonaldataontheirside(e.g.beforedeliveringdatatothecontroller/processor)
toincreasecontroloftheirownpersonaldata.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard)should
promoterisk-baseddatapseudonymisationthroughtheprovisionofrelevantguidanceand
examples.
1Regulation(EU)2016/679oftheEuropeanParliamentandoftheCouncilof27April2016ontheprotectionofnaturalpersons
withregardtotheprocessingofpersonaldataandonthefreemovementofsuchdata,andrepealingDirective95/46/EC(General
DataProtectionRegulation)https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
Advancedtechniquesforadvancedscenarios
Whilethetechnicalsolutionisacriticalelementforachievingproperpseudonymisation,one
mustnotforgetthattheorganisationalmodelanditsunderlyingstructuralarchitecturearealso
veryimportantparametersofsuccess.Advancedtechniquesgotogetherwithadvanced
scenarios,suchasthecaseofthedatacustodianshipmodel.
Datacontrollersandprocessorsshouldconsiderpossiblescenariosthatcansupportadvanced
pseudonymisationtechniques,based-amongother-ontheprincipleofdataminimisation.
Theresearchcommunityshouldsupportdatacontrollersandprocessorsinidentifyingthe
necessarytrustelementsandguaranteesfortheadvancedscenarios(e.g.datacustodianship)
tobefunctionalinpractice.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard)should
ensurethatregulatoryapproaches,e.g.asregardsnewtechnologiesandapplicationsectors,
takeintoaccountallpossibleentitiesandrolesfromthestandpointofdataprotection,while
remainingtechnologicallyneutral.
Establishingthestate-of-the-art
Althoughalotofworkisalreadyinplace,thereiscertainlymoretobedoneindefiningthestate-
of-the-artindatapseudonymisation.Tothisend,researchandapplicationscenariosmustgo
hand-in-hand,involvingallrelevantparties(researchers,industry,andregulators)todiscuss
joinedapproaches.
TheEuropeanCommission,therelevantEUinstitutions,aswellasRegulators(e.g.Data
ProtectionAuthoritiesandtheEuropeanDataProtectionBoard)shouldsupporttheestablishment
andmaintenanceofthestate-of-the-artinpseudonymisation,bringingtogetherallrelevant
stakeholdersinthefield(regulators,researchcommunity,andindustry).
Theresearchcommunityshouldcontinueitseffortsonadvancingtheexistingworkondata
pseudonymisation,addressingspecialchallengesappearingfromemergingtechnologies,such
asArtificialIntelligence.TheEuropeanCommissionandtherelevantEUinstitutionsshould
supportanddisseminatetheseefforts.
Towardsthebroaderadoptionofdatapseudonymisation
Recentdevelopments,e.g.ininternationalpersonaldatatransfers,showclearlytheneedto
furtheradvanceappropriatesafeguardsforpersonaldataprotection.Thiswillonlybeintensified
inthefuturebytheuseofemergingtechnologiesandtheneedforopendataaccess.Itis,thus,
importanttostarttodaythediscussiononthebroaderadoptionofpseudonymisationindifferent
applicationscenarios.
Regulators(e.g.DataProtectionAuthoritiesandtheEuropeanDataProtectionBoard),the
EuropeanCommissionandtherelevantEUinstitutionsshoulddisseminatethebenefitsofdata
pseudonymisationandprovideforbestpracticesinthefield.
1.INTRODUCTION
Pseudonymisationisanestablishedandaccepteddataprotectionmeasurethathasgained
additionalattentionfollowingtheadoptionoftheGeneralDataProtectionRegulation(GDPR),
whereitisbothspecificallydefined(Article4(5)GDPR)2andmanytimesreferencedasa
safeguard.Technicalandorganisationalmeasures,inparticularforsecurityanddataprotection
bydesign,comprisepseudonymisation.Theapplicationofpseudonymisationtopersonaldata
canreducetheriskstothedatasubjectsconcernedandhelpcontrollersandprocessorsmeet
theirdataprotectionobligations.Nevertheless,noteveryso-calledpseudonymisation
mechanismfulfilsthedefinitionoftheGDPR,andpseudonymisationtechniquesthatmaywork
inonespecificcasetoachievedataprotection,maynotbesufficientinothercases3.Still,the
basicconceptofsubstitutingidentifyingdatawithpseudonymscancontributetoreducingdata
protectionrisks.
1.1BACKGROUND
Giventhegrowingimportanceofpseudonymisationforbothdatacontrollersanddatasubjects,
ENISAhasbeenworkingoverthepastyearsonthistopic,inco-operationwithexpertsand
nationalregulatoryauthorities.Indeed,ENISAissueditsfirstrelevantreportinJanuary2019
(ENISA,2019-1)presentinganoverviewofthenotionandmaintechniquesof
pseudonymisationincorrelationwithitsnewroleundertheGDPR.AsecondENISAreport
followedinNovember2019(ENISA,2019-2)withamoredetailedanalysisofthetechnical
methodsandspecificexamplesandbestpracticesforparticulardatasets,i.e.emailaddresses,
IPaddressesandmorecomplexdatasets.Inaddition,adedicatedworkshopon
pseudonymisation4wasco-organisedbyENISAandtheDataProtectionAuthorityofthe
GermanFederalStateofSchleswig-Holstein(ULD)inNovember2019inordertoexchange
informationandexperienceamongkeystakeholders5.
Whileworkandregulatoryguidanceinthefieldisgrowing6,itisapparentthatfurthereffortis
needed,especiallyaddressingspecificapplicationscenariosanddifferenttypesofdatasets.
BothENISA'sreportsandtheconclusionsoftheULD-ENISAworkshopleadtowardsthis
direction,whichcouldeventuallysupportthedevelopmentofMacatalogueoftechniques"ora
,,cookbookntowardsapplyingpseudonymisationinpracticeindifferentapplicationscenarios.
2IIhastobenotedthatpersonaldatathathasbeenpseudonymisedisstillregardedas"personaldata"pursuanttoArticle4(1)
GDPRandmustnotbeconfusedwith"anonymiseddata"whereitisnolongerpossibleforanyonetoreferbacktoindividualdata
subjects,seeRecital28GDPR.
3Inordertofullyunderstandtheroleofpseudonymisationfortheprocessingofpersonaldata,afullanalysisofthelegalsituation
inthespecificcasewouldalsoberequired.
Fortheassessmentofconcreteprocessingoperations,controllersandprocessorsmusttakeaccountofallfactorsplayingarole
fortherisktothefundamentalrightsofindividualsinducedbytheprocessingassuchandbypotentialbreachesofsecurity,also
goingbeyondtechnicalandorganisationalmeasuresconsideredinthisstudy.
https://www.enisa.europa.eu/events/uld-enisa-workshop/uld-enisa-workshop-pseudonymization-and-relevant-security-
technologies
https://www.enisa.europa.eu/events/uld-enisa-workshop/uld-enisa-workshop-notes/view
6SeealsoEDPSandSpanishDPAjointpaperontheintroductionofhashaspseudonymisationtechnique,
https://edps.europa.eu/data-protection/our-workypublications/papers/introduction-hash-function-personal-data.en
Shouldthisbeachieved,itwouldbeasignificantsteptowardsthedefinitionofthestate-of-the-
artforpseudonymisationtechniques.
AgainstthisbackgroundandfollowingpreviousrelevantENISA'swork7,theAgencydecided
underits2020work-programmetoelaboratefurtheronthepracticalapplicationofdata
pseudonymisationtechniques.
1.2OBJECTIVES
TheoverallscopeofthisreportistocontinuepastENISA'sworkbyproviding(onthebasisof
thepreviousanalysis)specificusecasesforpseudonymisation,alongwithmoreadvanced
techniquesandscenariosthatcansupportitspracticalimplementationbydatacontrollersor
processors.
Morespecifically,theobjectivesofthereportareasfollows:
•Explorefurtheradvancedpseudonymisationtechniqueswhichwerenotcoveredin
priorENISA*swork,basedoncryptographicalgorithmsandprivacyenhancing
technologies.
•Discussspecificapplicationusecaseswherepseudonymisationcanbeapplied,
analysingtheparticularscenarios,rolesandtechniquesthatcouldbeofinterestineach
case.Inparticular,forthescopeofthereport,usecasesarepresentedintwodifferent
sectors:(a)healthcareinformationexchange;(b)cybersecurityinformationexchange
withtheuseofinnovativetechnologies(e.g.machinelearningtechnologies).
Itshouldbenotedthattheselectionoftheusecaseswasbasedonthefactthatthespecific
sectors(healthcare,cybersecurity)representquitecommoncasesfortheapplicationof
pseudonymisationinseveralreal-lifesituations.Atthesametime,theselectedusecasesalso
reflectdiverserequirementswithregardtopseudonymisation,e.g.intermsofthe
scenarios/rolesinvolved,aswellasintermsofthetechniquesthatcouldbeappliedinpractice.
Thetargetaudienceofthereportconsistsofdatacontrollers,dataprocessorsand
manufacturers/producersofproducts,servicesandapplications,DataProtectionAuthorities
(DPAs),aswellasanyotherinterestedpartyindatapseudonymisation.
Thedocumentassumesabasiclevelofunderstandingofpersonaldataprotectionprinciplesand
therole/processofpseudonymisation.ForanoverviewofdatapseudonymisationunderGDPR,
pleasealsorefertorelevantENISA'sworkinthefield(ENISA,2019-1)&(ENISA,2019
-2).
Thediscussionandexamplespresentedinthereportareonlyfocusedontechnicalsolutions
thatcouldpromoteprivacyanddataprotection;theyshouldbynomeansbeinterpretedasa
legalopinionontherelevantcases.
https://www.enisa.europa.eu/topics/data-protection/privacy-by-design
1.3OUTLINE
Theoutlineoftheremainingpartofthereportisasfollows:
•Chapter2providesanoverviewofthebasicscenarios,pseudonymisationtechniques
andpoliciesdiscussedunder(ENISA,2019-2).
•Chapter3presentsanumberofadvancedpseudonymisationtechniques,including
asymmetricencryption,ringsignatures,chainingmode,Merkletrees,pseudonymswith
prooforownership,securemultipartycomputationandsecretsharingschemes.
•Chapter4analysespseudonymisationtechniquesandapplicationscenariosinthe
areaofhealthcare.Itparticularlyfocusesontheuseofthetree-basedpseudonyms
approachandthedatacustodianshipmodel.
•Chapter5discussestheapplicationofpseudonymisationinthebroaderareaof
cybersecuritytechnologies.
•Chapter6summarisesthepreviousdiscussionsandprovidesthemainconclusions
andrecommendationsforallrelatedstakeholders.
ThisreportispartoftheworkofENISAintheareaofprivacyanddataprotection8,which
focusesonanalysingtechnicalsolutionsfortheimplementationofGDPR,privacybydesignand
securityofpersonaldataprocessing.
https://www.enisa.europa.eu/topics/data-protection
2.PSEUDONYMISATIONBASICS
Asmentionedin(ENISA,2019-2),themostobviousbenefitofpseudonymisationistohidethe
identityofthedatasubjectsfromanythirdparty(otherthanthePseudonymisationEntity,i.e.the
entityresponsibleforpseudonymisation).Still,pseudonymisationcangobeyondhidingreal
identitiesanddataminimisationintosupportingthedataprotectiongoalofunlinkabilityand
contributingtowardsdataaccuracy.
Whenimplementingpseudonymisation,itisimportanttoclarifyasafirststeptheapplication
scenarioandthedifferentrolesinvolved,inparticulartheroleofthePseudonymisationEntity
(PE),whichcanbeattributedtodifferententities(e.g.adatacontroller,adataprocessor,a
TrustedThirdPartyorthedatasubject),dependingonthecase.Underaspecificscenario,itis
thenrequiredtoconsiderthebestpossiblepseudonymisationtechniqueandpolicythatcanbe
applied,giventhebenefitsandpitfallsthateachoneofthosetechniquesorpoliciesentails.
Obviously,thereisnotaone-size-fits-allapproachandriskanalysisshouldinallcasesbe
involved,consideringprivacyprotection,utility,scalability,etc.
Inthatregard,thisChapterprovidesabriefoverviewofthebasicpseudonymisationscenarios
andtechniques,astheseareoutlinedin(ENISA,2019-2),whichw川bethenfurther
complementedandanalysedinthenextChaptersofthereport.
2.1PSEUDONYMISATIONSCENARIOS
Sixdifferentpseudonynimisationscenariosarediscussedin(ENISA,2019-2)andare
presentedinFigure1below.Thedefiningdifferencebetweenthescenariosisfirstlytheactor
whotakestheroleofthePseudonymisationEntity(PE)andsecondlytheotherpotentialactors
thatmaybeinvolved(andtheirroles).
Clearly,inallthreefirstscenariosinFigure1,thedatacontrolleristhePE,eitheractingalone
(scenario1)orinvolvingaprocessorbeforepseudonymisation(scenario2)orafter
pseudonymisation(scenario3).Inscenario4,thePEistheprocessorthatperforms
pseudonymisationonbehalfofthecontroller(thus,controllermaintainingstillcontroloverthe
originaldata).Scenario5setsaTrustedThirdPartyentity,outsidethecontrolofthedata
controller,asPE,thereforeinvolvinganintermediarytosafeguardthepseudonymisation
process.Lastly,scenario6providesfordatasubjectstobethePEand,thus,controlan
importantpartofthepseudonymisationprocess.
Laterinthisreportwewillexplorethepracticalapplicationofthesescenariosinspecificcases,
especiallyscenarios1and3undercybersecurityusecases(Chapter5)andscenarios5and6
underhealthcareusecases(Chapter4).Forthescenario5particularlywewillfurtherdetailthe
notionoftheTrustedThirdParty(datacustodian)andtheformsthatitcouldtakeinthe
healthcaresector.
Figure1:Basicpseudonymisationscenarios
PseudonymlsatlonScenario1
DATACONTROLLER&DATACONTROLLER&
DATADATAPSEUDONYMISATIONDATAPSEUDONYMISATIONDATA
SUBJECTSPROCESSORENTITYSUBJECTSENTITYCONTROLLER
BetaInc.AlphaCorp.AlphaCorp.BetaInc.
PseudonymisationSecretPseudonymisationSecret
IdentifierPseudonymIdentifierPseudonym
Alice15Alice15
Bob28Bob28
Charly3Charly3
PscudonymiMtlonScenario2PseudonymisationScenario3
DATADATA
CONTROLLERCONTROLLER
AlphaCorp.AlphaCorp.
PseudonyvniMtionScvnario4PieudonyniisationScenario5
taeudon^vrikMtlonSecret
Alice15
IdtnclfltrPMiid❹nyni
Hob28
Charly3
PseudonymlMtlonScenario6
2.2PSEUDONYMISATIONTECHNIQUESANDPOLICIES
Thebasicpseudonymisationtechniquesthatcanbeappliedinpractice,asalsodiscussedin
(ENISA,2019-2)areasfollows:
•Counter:thesimplestpseudonymisationfunction,wheretheidentifiersaresubstituted
byanumberchosenbyamonotoniccounter.Itsadvantagesrestwithitssimplicity,
whichmakeitagoodcandidateforsmallandnotcomplexdatasets.Itprovidesfor
pseudonymswithnoconnectiontotheinitialidentifiers(althoughthesequential
characterofthecountercanstillprovideinformationontheorderofthedatawithina
dataset).However,thesolutionmayhaveimplementationandscalabilityissuesin
casesoflargeandmoresophisticateddatasets.
•RandomNumberGenerator(RNG):asimilarapproachtothecounterwiththe
differencethatarandomnumberisassignedtotheidentifier.Itprovidesstrongdata
protection(as,contrarytothecounter,arandomnumberisusedtocreateeach
pseudonym,thusitisdifficulttoextractinformationregardingtheinitialidentifier,
unlessthemappingtableiscompromised).Collisions,however,maybeanissue9,as
wellasscalability,dependingontheimplementationscenario.
•Cryptographichashfunction:directlyappliedtoanidentifiertoobtainthe
correspondingpseudonymwiththepropertiesofbeinga)one-wayandb)collision
free10.Whileahashfunctioncansignificantlycontributetowardsdataintegrity,itis
generallyconsideredweakasapseudonymisationtechnique,asitispronetobrute
forceanddictionaryattacks(ENISA,2019-2).
•Messageauthenticationcode(MAC):similartoacryptographichashfunctionexcept
thatasecretkeyisintroducedtogeneratethepseudonym.Withouttheknowledgeof
thiskey,itisnotpossibletomaptheidentifiersandthepseudonyms.MACisgenerally
consideredasarobustpseudonymisationtechniquefromadataprotectionpointof
view.Recoverymightbeanissueinsomecases(i.e.iftheoriginalidentifiersarenot
beingstored).Differentvariationsofthemethodmayapplywithdifferentutilityand
scalabilityrequirements.HMAC(Bellare,Canetti,&Krawczyk,1996)isbyfarthemost
populardesignofmessageauthenticationcodeusedinInternetprotocols.
•Symmetricencryption:theblockcipherisusedtoencryptanidentifierusingasecret
key,whichisboththepseudonymisationsecretandtherecoverysecret.Usingblock
ciphersforpseudonymisationrequirestodealwiththeblocksize.Symmetricencryption
isarobustpseudonymisationtechnique,withseveralpropertiesbeingsimilartoMAC
(i.e.theaforementionedpropertiesofthesecretkey).Onepossibleissueintermsof
dataminimisationisthatthePEcanalwaysreversethepseudonyms,evenifthereis
noneedtostoretheinitialindividuals'identifiers.
9Still,itshouldbenotedthatcryptography-basedconstructionsofpseudo-randomnumbergeneratorsareavailable,whichcan
avoidcollisionsiftheyareproperlyconfiguredandcouldbepossiblysimilarlyusedtoprovidepseudonyms(e.g.discretelogarithm
basedconstructions(Blum,Feldman,&Micali,1984).
10Thisholdsundertheassumptionthatacryptographicallystronghashfunctionisused.Moreover,itisessentialthathashing
shouldbeappliedtoappropriateindividual'sidentifiers(e.g.hashingthefirstnameandlastnamemaynotavoidcollisions,ifthis
combinationdoesnotconstituteanidentifierinaspecificcontext-i.e.theremaybetwoindividualswiththesamefistnameand
lastname).Moredetailsaregivenin(ENISA,2019-1)(ENISA,2019-2).
Independentlyofthechoiceofthetechnique,thepseudonymisationpolicy(i.e.thepractical
implementationofthetechnique)isalsocriticaltotheimplementationinpractice.Threedifferent
pseudonymisationpolicieshavebeenconsideredtothatend:
•Deterministicpseudonymisation:inallthedatabasesandeachtimeitappears,Idis
alwaysreplacedbythesamepseudonympseudo.
•Documentrandomisedpseudonymisation:eachtimeIdappearsinadatabase,itis
substitutedwithadifferentpseudonym(pseudoi,pseudo2i...)-,however,Idisalways
mappedtothesamecollectionof(pseudoi,pseudo^inthedatasetAandB.
•Fullyrandomisedpseudonymisation:foranyoccurrencesofIdwithinada
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 《实验室生物安全》课件
- 2009年高考语文试卷(北京)(解析卷)
- 幼儿园科学活动说课稿
- 材料工程师工作总结
- 2023年-2024年安全教育培训试题含答案(B卷)
- 《电商营销推广》课件
- 云计算商业模式-洞察分析
- 星系团形成与演化-洞察分析
- 网络电影与观众互动-洞察分析
- 水平转移的进化意义-洞察分析
- QC成果解决铝合金模板混凝土气泡、烂根难题
- 管线管廊布置设计规范
- 提升教练技术--回应ppt课件
- 招聘与录用选择题
- 《工资、薪金的个人所得税的计算》教学设计
- 精品洲际酒店集团皇冠酒店设计标准手册
- 周视瞄准镜的初步设计-北京理工大学-光电学院小学期作业
- Writing写作教学设计
- 心房起搏电极的位置选择ppt课件
- 四川省南充市2019-2020学年九年级上期末数学试卷(含答案解析)
- 上海市宝山区2019届高三英语一模含答案
评论
0/150
提交评论