Reiter et al. - Google Patents
Anonymous Web Transactions with Crowds An innovative way to become an invisible user is simply to get lost in the crowd. After all, anonymity loves company.Reiter et al.
View HTML- Document ID
- 14601399795456691512
- Author
- Reiter M
- Rubin A
External Links
Snippet
Web server log files are riddled with information about the users who visit them. Obviously, a server can record the content that each visitor accesses. In addition, however, the server can record the user's IP address—and thus often the user's Internet domain name, workplace …
- 238000004891 communication 0 abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Reiter et al. | Anonymous web transactions with crowds | |
Gritzalis | Enhancing web privacy and anonymity in the digital era | |
Gabber et al. | Consistent, yet anonymous, Web access with LPWA | |
Goldberg | A pseudonymous communications infrastructure for the internet | |
Clauß et al. | Privacy enhancing identity management: protection against re-identification and profiling. | |
JPH10254807A (en) | Method for reading server site anonymously | |
JP2005538434A (en) | Method and system for user-based authentication in a federated environment | |
Chen et al. | Privacy issues and solutions in social network sites | |
Gritzalis | Embedding privacy in IT applications development | |
EP4348981A1 (en) | A method for managing a digital identity | |
Clauβ et al. | Privacy enhancing identity management: protection against re-identification and profiling | |
Wright | Security, privacy, and anonymity | |
Deswarte et al. | Current and future privacy enhancing technologies for the internet | |
Oppliger | Privacy protection and anonymity services for the World Wide Web (WWW) | |
Shapira et al. | PRAW—A PRivAcy model for the Web | |
Chadwick et al. | A conceptual model for attribute aggregation | |
Reiter et al. | Anonymous Web Transactions with Crowds An innovative way to become an invisible user is simply to get lost in the crowd. After all, anonymity loves company. | |
Waldman et al. | The architecture of robust publishing systems | |
Levesque | Hacktivism: The how and why of activism for the digital age | |
Rieke et al. | JANUS: Server anonymity in the world-wide web | |
Wei et al. | Foggy: a new anonymous communication architecture based on microservices | |
Claessens et al. | A secure and privacy-preserving web banner system for targeted advertising | |
Mandujano | Towards the preservation of a key feature of the internet: Policy and technology for cyberspace anonymity | |
Karuppanan | Security, privacy, and trust in social networks | |
Jayasree et al. | Anonymity and accountability in web based transactions |