Abstract
In this chapter, solutions for the requirements of anonymity and pseu-donymity given in Chapter 4 are presented. The solutions proposed here are independent of particular user modeling systems and user adaptive systems. Hence, requirements which depend on the type of adaptive system, its domain, or the user modeling system employed are discussed only in terms of features common to many such systems. Ways of using the implementation in providing environmental anonymity for a wide range of user adaptive systems are described. The KQMLmix implementation also makes it possible to include components of the user adaptive system and the user in the anonymization process, giving the user greater confidence in the anonymization process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Scrambling might be performed, e.g, through encoding in an application dependent format.
See http://www.atg.com/products, http://www.rewebber.de.
A better approach can be found in JAP (Java Anonymity Proxy, [Berthold et al., 2001]) which keeps information also secret from the intermediaries.
See the Results of the Workshop “Standardization of User Modeling Shell Systems” (www.ics.uci.edu/~kobsa/papers/1996-kobsa-pohl-fink-rfc.pdf) on http://www.urn.org/conferences.html.
KQML is currently used in the user modeling shell systems BGP-MS (see Chapter 8.2) and TAGUS (see Table 1.1 on p. 13).
Despite the limitation of the mix component to KQML, it is denoted mix for short.
See http://www.KQMLmix.net. 8 See http://java.sun.com. 9 See http://java.stanford.edu. 10 See http://www.cryptix.org.
See [Schneier, 1996, p. 32].
See [Schneier, 1996, p. 336] or [Menezes et al., 1997, p. 281].
See [Schneier, 1996, p. 532] or [Menezes et al., 1997, p. 294]. Both algorithms were chosen because they are available without license restrictions.
See Request for Comments (RFC) 2045: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies.
RACE (Research and Development in Advanced Communication Technologies in Europe) integrity primitives evaluation message digest, see [Schneier, 1996, p. 445], [Menezes et al., 1997, p. 350], and the Cryptix object Signature.getInstance(“RIPEMD160/ElGamal/PKCS#1”).
See Chapter 6.2.3.1.
Successive symmetrical encryption offers no better secrecy than single encryption. Through renewed encryption at each mix in the sequence, the outgoing message looks different than the incoming. This prevents an observer from relating these two messages.
This also includes dummy messages which are produced to prevent undue latency (see p. 73).
In addition to the anonymization techniques for web usage discussed in Chapter 6.1.3 also the KQMLmix implementation can be used to supply procedural anonymity for HTTP. We developed a proxy which is able to route HTTP requests and the corresponding replies from web servers through a mix network.
In contrast to the solutions described in Chapter 6.1.3 the parameters for the anonymization process (e.g., the length of the mix sequence and the affected mixes) may change with each KQML message.
SKQML application programmer interface
For instance, see the summary of P3P, Chapter 8.5.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Schreck, J. (2003). Solutions for Anonymity and Pseudonymity. In: Security and Privacy in User Modeling. Human-Computer Interaction Series, vol 2. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-0377-2_7
Download citation
DOI: https://doi.org/10.1007/978-94-017-0377-2_7
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-6223-9
Online ISBN: 978-94-017-0377-2
eBook Packages: Springer Book Archive