[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11909033_17guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

PPINA – a forensic investigation protocol for privacy enhancing technologies

Published: 19 October 2006 Publication History

Abstract

Although privacy is often seen as an essential right for internet users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhancing Technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered. This paper proposes a forensic investigation technique, which can be embedded in the framework of existing PETs, thereby adding network forensic functionality to the PET. This approach introduces a new dimension to the implementation of Privacy Enhancing Technologies, which enhances their viability in the global network environment.

References

[1]
Andreas Pfitzmann (2005), "Anonymity, Unlinkability, Unobservability, Pseudonymity and Identity Management - A Consolidated Proposal for Terminology"
[2]
http://slis.cua.edu/ihy/fall01/tpedoc/pl106229.pdf
[3]
http://www.ntia.doc.gov/ntiahome/ntiageneral/esign/105b/esign7.htm
[4]
Stephen E. Blythe, Digital Signature Law of the United Nations, European Union, United Kingdom and United Stats: Promotion of Growth in ECommerce with Enhanced Security, 11 RICH. J.L. & TECH. 2 (2005), at http://law.richmond.edu/jolt/v11i2/article6.pdf
[5]
http://europa.eu.int/eur-lex/pri/en/oj/dat/2000/l 013/l 01320000119en00120020. pdf
[6]
Gritzalis S., "Enhancing Web Privacy and Anonymity in the Digital Era", Information Management and Computer Security, Vol.12, No.3, pp.255-288, 2004, Emerald
[7]
Anonymizer (2003), available at http://www.anonymizer.com
[8]
Reiter M., Rubin A., "Crowds: Anonymity for web transactions", ACM Transactions on Information and System Security (TISSEC), Vol. 1, Issue 1 (Nov 1998), Pages: 66 - 92
[9]
Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security, Symposium, August 2004
[10]
Clay Shields, Brian Neil Levine, "A Protocol for Anonymous Communication Over the Internet", November 2000 Proceedings of the 7th ACM conference on Computer and communications security
[11]
Philippe Golle, Ari Juels, "Parallel Mixing", October 2004 Proceedings of the 11th ACM conference on Computer and communications security
[12]
Ulf Moller, Lance Cottrell, Peter Palfrader, and Len Sassaman. "Mixmaster Protocol", Version 2. Draft, July 2003, available at http://www.abditum.com/ mixmaster-spec.txt
[13]
Marc Rennhard, Bernhard Plattner, "Practical anonymity for the masses with morphmix", In Ari Juels, editor, Financial Cryptography. Springer-Verlag, LNCS 3110, 2004.
[14]
Alessandro Acquisti (2005), "Privacy in Electronic Commerce and the Economics of Immediate Gratification"
[15]
Patrick W. Brown, "Digital signatures: can they be accepted as legal signatures in EDI?", December 1993, Proceedings of the 1st ACM conference on Computer and communications security

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CMS'06: Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
October 2006
251 pages
ISBN:3540478205

Sponsors

  • FORTH: Foundation for Research and Technology - Hellas
  • ENISA: European Network and Information Security Agency
  • A-SIT (Zentrum für sichere Informationtechnologie - Austria): A-SIT (Zentrum für sichere Informationtechnologie - Austria)

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 19 October 2006

Author Tags

  1. network forensics
  2. privacy enhancing technologies

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media