Levels of Anonymity

dc.creatorFlinn,Bill
dc.creatorMaurer,Hermann
dc.date1995
dc.date.accessioned2024-02-06T12:47:34Z
dc.date.available2024-02-06T12:47:34Z
dc.descriptionIn this paper we make a first attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such obvious cases as identified by means of a password or anonymous use there are many other levels of anonymity, identification and authenticity necessary in various applications.
dc.formattext/html
dc.identifierhttps://doi.org/10.3217/jucs-001-01-0035
dc.identifierhttps://lib.jucs.org/article/27080/
dc.identifier.urihttps://openrepository.mephi.ru/handle/123456789/6725
dc.languageen
dc.publisherJournal of Universal Computer Science
dc.relationinfo:eu-repo/semantics/altIdentifier/eissn/0948-6968
dc.relationinfo:eu-repo/semantics/altIdentifier/pissn/0948-695X
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightsJ.UCS License
dc.sourceJUCS - Journal of Universal Computer Science 1(1): 35-47
dc.subjectsecurity
dc.subjectanonymous use
dc.subjectaccess control
dc.subjectauthentication
dc.subjectbig brother
dc.titleLevels of Anonymity
dc.typeResearch Article
Файлы