Skip to main content

Solutions for Anonymity and Pseudonymity

  • Chapter
Security and Privacy in User Modeling

Part of the book series: Human-Computer Interaction Series ((HCIS,volume 2))

  • 118 Accesses

Abstract

In this chapter, solutions for the requirements of anonymity and pseu-donymity given in Chapter 4 are presented. The solutions proposed here are independent of particular user modeling systems and user adaptive systems. Hence, requirements which depend on the type of adaptive system, its domain, or the user modeling system employed are discussed only in terms of features common to many such systems. Ways of using the implementation in providing environmental anonymity for a wide range of user adaptive systems are described. The KQMLmix implementation also makes it possible to include components of the user adaptive system and the user in the anonymization process, giving the user greater confidence in the anonymization process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Scrambling might be performed, e.g, through encoding in an application dependent format.

    Google Scholar 

  2. See http://www.atg.com/products, http://www.rewebber.de.

  3. A better approach can be found in JAP (Java Anonymity Proxy, [Berthold et al., 2001]) which keeps information also secret from the intermediaries.

    Google Scholar 

  4. See the Results of the Workshop “Standardization of User Modeling Shell Systems” (www.ics.uci.edu/~kobsa/papers/1996-kobsa-pohl-fink-rfc.pdf) on http://www.urn.org/conferences.html.

  5. KQML is currently used in the user modeling shell systems BGP-MS (see Chapter 8.2) and TAGUS (see Table 1.1 on p. 13).

    Google Scholar 

  6. Despite the limitation of the mix component to KQML, it is denoted mix for short.

    Google Scholar 

  7. See http://www.KQMLmix.net. 8 See http://java.sun.com. 9 See http://java.stanford.edu. 10 See http://www.cryptix.org.

  8. See [Schneier, 1996, p. 32].

    Google Scholar 

  9. See [Schneier, 1996, p. 336] or [Menezes et al., 1997, p. 281].

    Google Scholar 

  10. See [Schneier, 1996, p. 532] or [Menezes et al., 1997, p. 294]. Both algorithms were chosen because they are available without license restrictions.

    Google Scholar 

  11. See Request for Comments (RFC) 2045: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies.

    Google Scholar 

  12. RACE (Research and Development in Advanced Communication Technologies in Europe) integrity primitives evaluation message digest, see [Schneier, 1996, p. 445], [Menezes et al., 1997, p. 350], and the Cryptix object Signature.getInstance(“RIPEMD160/ElGamal/PKCS#1”).

    Google Scholar 

  13. See Chapter 6.2.3.1.

    Google Scholar 

  14. Successive symmetrical encryption offers no better secrecy than single encryption. Through renewed encryption at each mix in the sequence, the outgoing message looks different than the incoming. This prevents an observer from relating these two messages.

    Google Scholar 

  15. This also includes dummy messages which are produced to prevent undue latency (see p. 73).

    Google Scholar 

  16. In addition to the anonymization techniques for web usage discussed in Chapter 6.1.3 also the KQMLmix implementation can be used to supply procedural anonymity for HTTP. We developed a proxy which is able to route HTTP requests and the corresponding replies from web servers through a mix network.

    Google Scholar 

  17. In contrast to the solutions described in Chapter 6.1.3 the parameters for the anonymization process (e.g., the length of the mix sequence and the affected mixes) may change with each KQML message.

    Google Scholar 

  18. SKQML application programmer interface

    Google Scholar 

  19. For instance, see the summary of P3P, Chapter 8.5.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Schreck, J. (2003). Solutions for Anonymity and Pseudonymity. In: Security and Privacy in User Modeling. Human-Computer Interaction Series, vol 2. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-0377-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-0377-2_7

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-6223-9

  • Online ISBN: 978-94-017-0377-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics