- 1 Anonymität und Privacy (JAP). 〈http://anon.inf.tu-dresden.de/〉.Google Scholar
- 2 Tools for Protecting Online Privacy. 〈http://www.epic.org/privacy/tools.html〉.Google Scholar
- 3 Bacard, A. Anonymous Remailer FAQ. 〈http://www.andrebacard.com/remail.html〉.Google Scholar
- 4 Bäumler, H. E-Privacy. "E-Commerce Meets E-Privacy." Vieweg Verlag, 2000.Google Scholar
- 5 Bäumler, H. E-Privacy. "Datenschutz im Internet." Vieweg Verlag, 2000.Google Scholar
- 6 Bäumler, H. E-Privacy. "Privacy Tools." Vieweg Verlag, 2000.Google Scholar
- 7 Chaum, D. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. 1981. 〈http://world.std.com/~franl/crypto/chaum-acm-1981.html〉.Google Scholar
- 8 Convention on Cybercrime. 〈http://conventions.coe.int/〉.Google Scholar
- 9 Berliner Beauftragter für Datenschutz und Informationsfreiheit. 〈http://www.datenschutz-berlin.de/home.htm〉.Google Scholar
- 10 The Economist. No Hiding Place: The Protection of Privacy Will Be a Huge Problem for the Internet Society. 2003. 〈http://www.economist.com/displayStory.cfm? story_id=1534283〉.Google Scholar
- 11 Fasoldt, A. How Did We Cope Without the Internet? A Look Back After 20 Years of 'Technofile'. 〈http://aroundcny.com/technofile/texts/tec113003.html〉.Google Scholar
- 12 The Free Network Project. 〈http://www.freenetproject.org/〉.Google Scholar
- 13 Gavison, R. Privacy and the Limits of Law. Yale Law Journal, 89, 1980, pp. 421-471.Google ScholarCross Ref
- 14 Mediendienste-Staatsvertrag - MDStV. 〈http://www.datenschutzberlin.de/recht/de/stv/mdstv.htm〉.Google Scholar
- 15 Teledienstedatenschutzgesetz - TDDSG. 〈http://www.netlaw.de/gesetze/tddsg.htm〉.Google Scholar
- 16 Goltzsch, P. Anonymitauml;t im Internet. Bundeszentrale für Politische Bildung, Schriftenreihe Bd. 382. 〈http://www.bpb.de/publikationen/3DIHPI,0,0,Anonymität_im_Internet.html〉.Google Scholar
- 17 Kesdogan, D. Privacy im Internet - Vertrauenswürdige Kommunikation in Offenen Umgebungen. Vieweg Verlag, 2000.Google Scholar
- 18 Köhntopp, M. and Köhntopp, K. Datenspuren im Internet. Computer & Recht, 4, 2000, pp. 248-257.Google Scholar
- 19 Confidentiality, Integrity, Availability (CIA). 〈http://privacy.med.miami.edu/glossary/xd_confidentiality_integrity_availability.htm〉.Google Scholar
- 20 Sign Out of Microsoft Passport! 〈http://www.epic.org/privacy/consumer/microsoft/〉.Google Scholar
- 21 Nissenbaum, H. Protecting Privacy in an Information Age: The Problem of Privacy in Public. Law and Philosophy, 17, 1998, pp. 559-596. 〈http://www.nyu.edu/projects/nissenbaum/papers/privacy.pdf〉.Google Scholar
- 22 Payback. 〈http://www.payback.de〉.Google Scholar
- 23 Privacy and Human Rights. 〈http://www.privacyinternational.org〉.Google Scholar
- 24 Schneier, B. Angewandte Kryptographie. Addison-Wesley, 2000.Google Scholar
- 25 Schneier, B. Secrets and Lies. John Wiley & Sons, 2000. Google ScholarDigital Library
- 26 Smith, R. M. On Internet Privacy and Profiling. 2000. 〈http://www.senate.gov/~commerce/hearings/0613smi.pdf〉.Google Scholar
- 27 The OpenSSH Project. 〈http://www.openssh.org/〉.Google Scholar
- 28 SSH Communications Security. 〈http://www.ssh.com/〉.Google Scholar
- 29 Introduction to SSL. 〈http://developer.netscape.com/docs/manuals/security/sslin/contents.htm〉.Google Scholar
- 30 The OpenSSL Project. 〈http://www.openssl.org/〉.Google Scholar
- 31 Sterling, B. Short History of the Internet. 〈http://w3.aces.uiuc.edu/AIM/scale/nethistory.html〉.Google Scholar
- 32 US Department of Commerce: Safe Harbor. 〈http://www.export.gov/safeharbor/〉.Google Scholar
- 33 The VPN Consortium. 〈http://www.vpnc.org/〉.Google Scholar
- 34 Washburn, K. TCP/IP: Running a Successful Network, 2e. Addison Wesley, 1996. Google ScholarDigital Library
- 35 Garfinkel, S. Database Nation: The Death of Privacy in the 21st Century. O'Reilly & Associates, 2001. Google ScholarDigital Library
Index Terms
- Security, privacy, and anonymity
Recommendations
Is Privacy possible without Anonymity?: The case for microblogging services
EuroSec '19: Proceedings of the 12th European Workshop on Systems SecurityTraditional approaches to privacy are usually based on top of anonymizing or pseudonymizing systems. For example, users who would like to protect their identity and/or hide their activities while browsing the web frequently use anonymizing systems (e.g.,...
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While ...
k-anonymity: a model for protecting privacy
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version ...
Comments