Skip to main content

Evaluating the Design Using Basic Building Blocks for Anonymity

  • Chapter
Privacy-Respecting Intrusion Detection

Part of the book series: Advances in Information Security ((ADIS,volume 35))

  • 431 Accesses

In this Chapter we use the basic building blocks for anonymity from the APES project, as introduced in Chap. 21, to evaluate the designs from Part II and Part III.

In Sect. 22.1 we decompose our designs and map the functionality that is relevant for certain anonymity aspects to appropriate building blocks from the APES approach. Having decomposed our designs into building blocks for anonymity, in Sect. 22.2 we firstly describe the use of each building block in our design, and we secondly consider the unused building blocks for further improvement of our design. The findings of this analysis are summarized in Sect. 22.3. The rather theoretical results from this Chapter are corroborated in Chap. 23 by an empirical performance evaluation of the implementation from Part III.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

(2007). Evaluating the Design Using Basic Building Blocks for Anonymity. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-68254-9_22

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-34346-4

  • Online ISBN: 978-0-387-68254-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics