Measuring Anonymity

被引:0
|
作者
Cai, Xiaojuan [1 ]
Gu, Yonggen [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci, BASICS Lab, Shanghai 200240, Peoples R China
[2] Huzhou Teacher Coll, Dept Comp Sci, Zhenjiang 313000, Peoples R China
关键词
Probabilistic applied pi calculus; anonymity; metric; Crowds; PROTOCOL; METRICS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Some systems offer probabilistic anonymity. The degree of anonymity is considered and defined by Reiter and Rubin [1]. In this paper metrics are proposed to measure anonymity of probabilistic Systems. The metric induces a topology on probabilistic applied pi processes, which are used to model anonymous systems. The degree of anonymity is formally defined, and as an illustrating example, Crowds - an anonymous system for web transaction - is analyzed.
引用
收藏
页码:183 / +
页数:3
相关论文
共 50 条
  • [31] ANONYMITY
    PATEY, DH
    LANCET, 1948, 252 (NOV27): : 872 - 872
  • [32] Some doubts about measuring self-interest using dictator experiments: the costs of anonymity
    Frohlich, N
    Oppenheimer, J
    Moore, JB
    JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2001, 46 (03) : 271 - 290
  • [33] gPHI: Lightweight Anonymity Protocol for Anonymity at Host and AS Levels
    Yoshinaka, Yutaro
    Takemasa, Junji
    Koizumi, Yuki
    Hasegawa, Toru
    2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING), 2022,
  • [34] A Fuzzy Anonymity Analysis Model for Mobility in Anonymity System
    Wang Liang
    Guo Yajun
    Yan Huifang
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 254 - 257
  • [35] Tor network anonymity evaluation based on node anonymity
    Cui, Jun
    Huang, Changqi
    Meng, Huan
    Wei, Ran
    CYBERSECURITY, 2023, 6 (01)
  • [36] Anonymity and Monitoring: How to Monitor the Infrastructure of an Anonymity System
    Mulazzani, Martin
    Huber, Markus
    Weippl, Edgar R.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (05): : 539 - 546
  • [37] Discussing Anonymity Metrics for Mix Based Anonymity Approaches
    Dang Vinh Pham
    Wright, Joss
    INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 149 - 168
  • [38] POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
    Backes, Michael
    Koch, Simon
    Meiser, Sebastian
    Mohammadi, Esfandiar
    Rossow, Christian
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1626 - 1628
  • [39] The Causality Test of Network Technical Anonymity and Perceptive Anonymity
    Chen, Xi
    Li, Yujie
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (03): : 279 - 287
  • [40] Quantifying Graph Anonymity, Utility, and De-anonymity
    Ji, Shouling
    Du, Tianyu
    Hong, Zhen
    Wang, Ting
    Beyah, Raheem
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1745 - 1753