Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
455121 | Computer Standards & Interfaces | 2008 | 9 Pages |
Abstract
Anonymity has been formalized and some metrics have been defined in the scope of anonymizing communication channels. In this paper, such formalization has been extended to cope with anonymity in those scenarios where users must anonymously prove that they own certain privileges to perform remote transactions. In these types of scenarios, the authorization policy states the privileges required to perform a given remote transaction. The paper presents a framework to analyze the actual degree of anonymity reached in a given transaction and allows its comparison with an ideal anonymity degree as defined by the authorization policy, providing a tool to model, design and analyze anonymous systems in different scenarios.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Vicente Benjumea, Javier Lopez, Jose M. Troya,