000 | 03732nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-540-44702-3 | ||
003 | DE-He213 | ||
005 | 20160624101951.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s2001 gw | s |||| 0|eng d | ||
020 |
_a9783540447023 _9978-3-540-44702-3 |
||
024 | 7 |
_a10.1007/3-540-44702-4 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aDesigning Privacy Enhancing Technologies _h[electronic resource] : _bInternational Workshop on Design Issues in Anonymity and Unobservability Berkeley, CA, USA, July 25–26, 2000 Proceedings / _cedited by Hannes Federrath. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2001. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2001. |
|
300 |
_a234 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v2009 |
|
505 | 0 | _aTerminology -- Anonymity, Unobservability, and Pseudonymity — A Proposal for Terminology -- Attacks on Systems -- Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems -- The Disadvantages of Free MIX Routes and How to Overcome Them -- Anonymous Publishing -- Freenet: A Distributed Anonymous Information Storage and Retrieval System -- The Free Haven Project: Distributed Anonymous Storage Service -- Mix Systems -- Towards an Analysis of Onion Routing Security -- Web MIXes: A System for Anonymous and Unobservable Internet Access -- Identity Management -- Privacy Incorporated Software Agent (PISA): Proposal for Building a Privacy Guardian for the Electronic Age -- Identity Management Based on P3P -- Pseudonyms and Remailers -- On Pseudonymization of Audit Data for Intrusion Detection -- Protection Profiles for Remailer Mixes. | |
520 | _aAnonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous. This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aInformation storage and retrieval systems. | |
650 | 0 | _aInformation systems. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aInformation Storage and Retrieval. |
650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
700 | 1 |
_aFederrath, Hannes. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540417248 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v2009 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/3-540-44702-4 |
942 |
_2EBK4970 _cEBK |
||
999 |
_c34264 _d34264 |