Designing Privacy Enhancing Technologies International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings

Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users...

Full description

Bibliographic Details
Other Authors: Federrath, Hannes (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2001, 2001
Edition:1st ed. 2001
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03169nmm a2200409 u 4500
001 EB001824518
003 EBX01000000000000000990964
005 00000000000000.0
007 cr|||||||||||||||||||||
008 180604 ||| eng
020 |a 9783540447023 
100 1 |a Federrath, Hannes  |e [editor] 
245 0 0 |a Designing Privacy Enhancing Technologies  |h Elektronische Ressource  |b International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings  |c edited by Hannes Federrath 
250 |a 1st ed. 2001 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2001, 2001 
300 |a X, 234 p  |b online resource 
505 0 |a Terminology -- Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology -- Attacks on Systems -- Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems -- The Disadvantages of Free MIX Routes and How to Overcome Them -- Anonymous Publishing -- Freenet: A Distributed Anonymous Information Storage and Retrieval System -- The Free Haven Project: Distributed Anonymous Storage Service -- Mix Systems -- Towards an Analysis of Onion Routing Security -- Web MIXes: A System for Anonymous and Unobservable Internet Access -- Identity Management -- Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the Electronic Age -- Identity Management Based on P3P -- Pseudonyms and Remailers -- On Pseudonymization of Audit Data for Intrusion Detection -- Protection Profiles for Remailer Mixes 
653 |a Computer Communication Networks 
653 |a Operating Systems 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Information Storage and Retrieval 
653 |a Electronic data processing / Management 
653 |a Information storage and retrieval systems 
653 |a Computer networks  
653 |a Computer Engineering and Networks 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Computer engineering 
653 |a IT Operations 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/3-540-44702-4 
856 4 0 |u https://doi.org/10.1007/3-540-44702-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues