[go: up one dir, main page]

Reiter et al. - Google Patents

Anonymous Web Transactions with Crowds An innovative way to become an invisible user is simply to get lost in the crowd. After all, anonymity loves company.

Reiter et al.

View HTML
Document ID
14601399795456691512
Author
Reiter M
Rubin A

External Links

Snippet

Web server log files are riddled with information about the users who visit them. Obviously, a server can record the content that each visitor accesses. In addition, however, the server can record the user's IP address—and thus often the user's Internet domain name, workplace …
Continue reading at cacm.acm.org (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation

Similar Documents

Publication Publication Date Title
Reiter et al. Anonymous web transactions with crowds
Gritzalis Enhancing web privacy and anonymity in the digital era
Gabber et al. Consistent, yet anonymous, Web access with LPWA
Goldberg A pseudonymous communications infrastructure for the internet
Clauß et al. Privacy enhancing identity management: protection against re-identification and profiling.
JPH10254807A (en) Method for reading server site anonymously
JP2005538434A (en) Method and system for user-based authentication in a federated environment
Chen et al. Privacy issues and solutions in social network sites
Gritzalis Embedding privacy in IT applications development
EP4348981A1 (en) A method for managing a digital identity
Clauβ et al. Privacy enhancing identity management: protection against re-identification and profiling
Wright Security, privacy, and anonymity
Deswarte et al. Current and future privacy enhancing technologies for the internet
Oppliger Privacy protection and anonymity services for the World Wide Web (WWW)
Shapira et al. PRAW—A PRivAcy model for the Web
Chadwick et al. A conceptual model for attribute aggregation
Reiter et al. Anonymous Web Transactions with Crowds An innovative way to become an invisible user is simply to get lost in the crowd. After all, anonymity loves company.
Waldman et al. The architecture of robust publishing systems
Levesque Hacktivism: The how and why of activism for the digital age
Rieke et al. JANUS: Server anonymity in the world-wide web
Wei et al. Foggy: a new anonymous communication architecture based on microservices
Claessens et al. A secure and privacy-preserving web banner system for targeted advertising
Mandujano Towards the preservation of a key feature of the internet: Policy and technology for cyberspace anonymity
Karuppanan Security, privacy, and trust in social networks
Jayasree et al. Anonymity and accountability in web based transactions