A Model-based Analysis of Tunability in Privacy Services

  • Reine Lundin
  • Stefan Lindskog
  • Anna Brunstrom
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 262)


In this paper, we investigate the tunable privacy features provided by Internet Explorer version 6 (IE6), Mix Net and Crowds, by using a conceptual model for tunable security services. A tunable security service is defined as a service that has been explicitly designed to offer various security configurations that can be selected at run-time. Normally, Mix Net and Crowds are considered to be static anonymity services, since they were not explicitly designed to provide tunability. However, as discussed in this paper, they both contain dynamic elements that can be used to utilize the trade-off between anonymity and performance. IE6, on the other hand, was indeed designed to allow end users to tune the level of privacy when browsing the Internet.


Privacy Service Tuner Preference Environmental Descriptor System Owner Anonymity Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981. http://www.eskimo.com/~weidai/mix-net.txt.Google Scholar
  2. 2.
    C. Díaz. Anonymity and Privacy in Electronic Services. PhD thesis, Katholieke Universiteit Leuven, Leuven, Belgium, December 2005.Google Scholar
  3. 3.
    S. Fischer-Hbner and C. Andersson. Privacy risks and challenges for the mobile internet. In Proceedings of the IEE Summit on Law and Computing, London, November 2 2004.Google Scholar
  4. 4.
    C. T. R. Hager. Context Aware and Adaptive Security for Wireless Networks. PhD thesis, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA, November 2004.Google Scholar
  5. 5.
    H. Johnson, L. Isaksson, M. Fiedler, and S. F. Wu. A decision system for adequate authentication. In Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06), Washington, DC, USA, April 23–29, 2006. IEEE Computer Society.Google Scholar
  6. 6.
    Y. Li, Z. Chen, S. M. Tan, and R. H. Campbell. Security enhanced MPEG player. In Proceedings of the 1996 International Workshop on Multimedia Software Development (MMSD’96), pages 169-176, Berlin, Germany, March 25–26 1996.Google Scholar
  7. 7.
    H. Lindskog and S. Lindskog. Web Site Privacy with P3P. Wiley Publishing, Indianapolis, IN, USA, 2003.Google Scholar
  8. 8.
    S. Lindskog, A. Brunstrom, and Z. Faigl. Analyzing tunable security services. In Proceedings of the 3rd Swedish National Computer Networking Workshop (SNCNW 2006), Luleå, Sweden, October 26–27, 2006.Google Scholar
  9. 9.
    S. Lindskog, A. Brunstrom, Z. Faigl, and K. Tóth. Providing tunable security services: An IEEE 802. Hi example. In Proceedings of the first Workshop on Enterprise Network Security (WENS 2006), Baltimore, MD, USA, August 28, 2006.Google Scholar
  10. 10.
    S. Lindskog, A. Brunstrom, R. Lundin, and Z. Faigl. A conceptual model of tunable security services. In Proceedings of the 3rd International Symposium on Wireless Communication Systems (ISWCS 2006), pages 531–535, Valencia, Spain, September 5–8, 2006.Google Scholar
  11. 11.
    J. Meyer and F. Gadegast. Security mechanisms for multimedia data with the example MPEG-I video, 1995. http://www.gadegast.de/frank/doc/secmeng.pdf.Google Scholar
  12. 12.
    U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol — Version 2, July 2003.Google Scholar
  13. 13.
    A. Pfitzmann and M. Hansen. Anonymity, unlinkability, undetectability, unob-servability, pseudonymity, and identity management — a consolidated proposal for terminology. Draft, July 2007.Google Scholar
  14. 14.
    C. P. Pfleeger and S. L. Pfleeger. Security in Computing. Prentice Hall, Upper Saddle River, NJ, USA, 3rd edition, 2003.MATHGoogle Scholar
  15. 15.
    P. Prasithsangaree and P. Krishnamurthy. On a framework for energy-efficient security protocols in wireless networks. Computer Communications, 27(17): 1716–1729, 2004.CrossRefGoogle Scholar
  16. 16.
    M. K. Reiter and A. D. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1):66–92, 1998.CrossRefGoogle Scholar
  17. 17.
    A. Westin. Privacy and Freedom. Atheneum, New York, NY, USA, 1967.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Reine Lundin
    • 1
  • Stefan Lindskog
    • 1
    • 2
  • Anna Brunstrom
    • 1
  1. 1.Department of Computer ScienceKarlstad UniversityKarlstadSweden
  2. 2.Centre for Quantifiable Quality of Service in Communication SystemsNorwegian University of Science and TechnologyTrondheimNorway

Personalised recommendations