In this Chapter we use the basic building blocks for anonymity from the APES project, as introduced in Chap. 21, to evaluate the designs from Part II and Part III.
In Sect. 22.1 we decompose our designs and map the functionality that is relevant for certain anonymity aspects to appropriate building blocks from the APES approach. Having decomposed our designs into building blocks for anonymity, in Sect. 22.2 we firstly describe the use of each building block in our design, and we secondly consider the unused building blocks for further improvement of our design. The findings of this analysis are summarized in Sect. 22.3. The rather theoretical results from this Chapter are corroborated in Chap. 23 by an empirical performance evaluation of the implementation from Part III.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Evaluating the Design Using Basic Building Blocks for Anonymity. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_22
Download citation
DOI: https://doi.org/10.1007/978-0-387-68254-9_22
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34346-4
Online ISBN: 978-0-387-68254-9
eBook Packages: Computer ScienceComputer Science (R0)