Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On anonymity in an electronic society: a survey of anonymous communication systems
Edman M., Yener B. ACM Computing Surveys42 (1):1-35,2009.Type:Article
Date Reviewed: Mar 23 2010

Edman and Yener provide in this paper a complete and clear survey of anonymity. They start by defining terms, to unify the terminologies. Some taxonomies found in the paper would allow researchers and developers to classify and define points to investigate and to better apply the techniques used.

The authors cover all topics related to the field: the taxonomies and terminologies mentioned above; mix and mixes networks; the flush algorithm, with a description of its operations and some critical comments; traffic analysis attacks; and future investigation in the field. The comments are of interest because they will help a developer choose the right solution. The coverage of the topics is quite complete--the paper provides a description, accompanied by a critical analysis of the implemented system. Edman and Yener also provide a critical overview of traffic analysis attacks.

In conclusion, this paper should be of interest to researchers who need to know what anonymity is, its variants, what traffic analysis methods can best be used, and the details about the concepts associated with anonymity.

Reviewer:  Kalinka Castelo Branco Review #: CR137846 (1007-0693)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Applications (SMTP, FTP, etc.) (C.2.2 ... )
 
 
Distributed Applications (C.2.4 ... )
 
 
Privacy (K.4.1 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Network Protocols (C.2.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy