Levels of Anonymity
dc.creator | Flinn,Bill | |
dc.creator | Maurer,Hermann | |
dc.date | 1995 | |
dc.date.accessioned | 2024-02-06T12:47:34Z | |
dc.date.available | 2024-02-06T12:47:34Z | |
dc.description | In this paper we make a first attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such obvious cases as identified by means of a password or anonymous use there are many other levels of anonymity, identification and authenticity necessary in various applications. | |
dc.format | text/html | |
dc.identifier | https://doi.org/10.3217/jucs-001-01-0035 | |
dc.identifier | https://lib.jucs.org/article/27080/ | |
dc.identifier.uri | https://openrepository.mephi.ru/handle/123456789/6725 | |
dc.language | en | |
dc.publisher | Journal of Universal Computer Science | |
dc.relation | info:eu-repo/semantics/altIdentifier/eissn/0948-6968 | |
dc.relation | info:eu-repo/semantics/altIdentifier/pissn/0948-695X | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.rights | J.UCS License | |
dc.source | JUCS - Journal of Universal Computer Science 1(1): 35-47 | |
dc.subject | security | |
dc.subject | anonymous use | |
dc.subject | access control | |
dc.subject | authentication | |
dc.subject | big brother | |
dc.title | Levels of Anonymity | |
dc.type | Research Article |