Based on the legal framework for pseudonyms described in Chap. 6, in this Chapter the more technically inclined aspects of pseudonyms are examined. The terms and concepts associated with the notion of anonymity and pseudonymity used in this text are introduced in Sect. 7.1. Two properties of pseudonyms are most important for the approaches presented in this book: Pseudonym disclosure is examined in Sect. 7.2 and pseudonym linkability is focused in Sect. 7.3. For a slightly broader perspective, further pseudonym properties are mentioned in Sect. 7.4. Based on the pseudonym concepts described in this Chapter the architectural model for secure authorizations is extended for pseudonymity in Chap. 8.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Pseudonyms – A Technical Point of View. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-68254-9_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34346-4
Online ISBN: 978-0-387-68254-9
eBook Packages: Computer ScienceComputer Science (R0)