Anonymity , Unobservability , Pseudonymity , and Identity Management
نویسندگان
چکیده
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, pseudonymity (pseudonyms and digital pseudonyms, and their attributes), and identity management.
منابع مشابه
Anonymity , Unobservability , Pseudonymity , and Identity Management – A Proposal for Terminology
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, pseudonymity (pseudonyms and digital pseudonyms, and their attributes), and identity management.
متن کاملAnonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, pseudonymity (pseudonyms and digital pseudonyms, and their attributes), and identity management. In addition, we describe the relationships between these terms, give a rational why we define them as we ...
متن کاملAnonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, and pseudonymity (pseudonyms and digital pseudonyms, and their attributes).
متن کاملImpact of Anonymity (Unlinkability, Pseudonymity, Unobservability) on Information Sharing
Since many web users have posted their opinions and information without revealing their personal identities (i.e. demographics, social standing, or expertise), anonymity has become a common form of exchanging information in online communities, such as social media, Internet forums, social networks, etc. In the meantime, negative social consequences due to malicious comments or identity deceptio...
متن کاملA privacy architecture for context-aware enterprise social networks
Context information is used to derive user profiles and social networks in an enterprise system called Instant Knowledge. This system requires privacy as well as conventional information security requirements. The privacy requirements include anonymity, unlinkability, unobservability and pseudonymity; these are designed to provide privacy by default to users of an Instant Knowledge service. A p...
متن کامل