<p>Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where use
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability Berkeley, CA, USA, July 25β26, 2000 Proceedings
β Scribed by Andreas Pfitzmann, Marit KΓΆhntopp (auth.), Hannes Federrath (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2001
- Tongue
- English
- Leaves
- 239
- Series
- Lecture Notes in Computer Science 2009
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.
This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
β¦ Table of Contents
Anonymity, Unobservability, and Pseudonymity β A Proposal for Terminology....Pages 1-9
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems....Pages 10-29
The Disadvantages of Free MIX Routes and How to Overcome Them....Pages 30-45
Freenet: A Distributed Anonymous Information Storage and Retrieval System....Pages 46-66
The Free Haven Project: Distributed Anonymous Storage Service....Pages 67-95
Towards an Analysis of Onion Routing Security....Pages 96-114
Web MIXes: A System for Anonymous and Unobservable Internet Access....Pages 115-129
Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the Electronic Age....Pages 130-140
Identity Management Based on P3P....Pages 141-160
On Pseudonymization of Audit Data for Intrusion Detection....Pages 161-180
Protection Profiles for Remailer Mixes....Pages 181-230
β¦ Subjects
Computer Communication Networks; Operating Systems; Management of Computing and Information Systems; Information Storage and Retrieval; Information Systems Applications (incl.Internet)
π SIMILAR VOLUMES
<P>This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Privacy Enhancing Technologies, PET 2002, held in San Francisco, CA, USA, in April 2002.</P><P>The 17 revised full papers presented were carefully selected during two rounds of reviewing and imp
<P>This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Privacy Enhancing Technologies, PET 2002, held in San Francisco, CA, USA, in April 2002.</P><P>The 17 revised full papers presented were carefully selected during two rounds of reviewing and imp
<p><P>This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.</P><P>The 13 revised full papers pre