Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
On secure and pseudonymous client-relationships with multiple servers
Gabber E., Gibbons P., Kristol D., Matias Y., Mayer A. ACM Transactions on Information and System Security2 (4):390-415,1999.Type:Article
Date Reviewed: Mar 1 2000

Janus is a cryptographic engine that may reside either in the computer that serves as an interface between a local network and the Internet, or in each computer attached to the local network. In the latter case, each Janus engine interacts with a proxy function in the computer acting as the network’s Internet interface. Janus provides ersatz identities to hide the identities of the local network’s users so that they can use Internet servers without revealing their true identities or permitting tracking of which servers each of them uses.

Janus also provides similarly pseudonymous email capability, supports both strong and weak encryption, and relieves individual users of burdens associated with secure interaction with Internet servers.

The authors give a complete, clear, and useful description of what they have done with Janus and an associated tool, the Lucent Personalized Web Assistant, and an illuminating discussion of the real-world problems they encountered and how they solved each.

Although some readers may regard the authors’ methods as fairly straightforward, they represent an insightful approach to requirements that may be both common and nettlesome.

Reviewer:  S. A. Kurzban Review #: CR122848 (0003-0220)
Bookmark and Share
 
Authentication (K.6.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Cyberpunk
Hafner K., Markoff J., Simon & Schuster, Inc., New York, NY, 1991. Type: Book (9780671778798)
Nov 1 1993
How to sign digital streams
Gennaro R., Rohatgi P. Information and Computation 165(1): 100-116, 2001. Type: Article
Dec 1 2001
Signature schemes based on the strong RSA assumption
Cramer R., Shoup V. ACM Transactions on Information and System Security 3(3): 161-185, 2000. Type: Article
Mar 1 2001
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy