Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Anonymous Web transactions with Crowds
Communications of the ACM
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The epistemic representation of information flow security in probabilistic systems
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Probabilistic Analysis of Anonymity
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Epistemic Verification of Anonymity
Electronic Notes in Theoretical Computer Science (ENTCS)
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Probabilistic analysis of an anonymity system
Journal of Computer Security - Special issue on CSFW15
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Achieving K-anonymity in mobile ad hoc networks
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Towards a tree-based taxonomy of anonymous networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Protecting user privacy with multi-field anonymisation of ip addresses
Proceedings of the 3rd international conference on Security of information and networks
Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization
Proceedings of the fourth ACM conference on Wireless network security
Comparison of low-latency anonymous communication systems: practical usage and performance
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Hi-index | 0.00 |
Anonymization enables organizations to protect their data and systems from a diverse set of attacks and preserve privacy; however, in the area of anonymized network data, few, if any, are able to precisely quantify how anonymized their information is for any particular dataset. Indeed, recent research indicates that many anonymization techniques leak some information. An ability to confidently measure this information leakage and any changes in anonymity levels plays a crucial role in facilitating the free-flow of cross-organizational network data sharing and promoting wider adoption of anonyimzation techniques. Fortunately, multiple methods of analyzing anonymity exist. Typical approaches use simple quantifications and probabilistic models; however, to the best of our knowledge, only one network data anonymization metric has been proposed. More importantly, no one-stop-shop paper exists that comprehensively surveys this area for other candidate measures; therefore, this paper explores the state-of-the-art of anonymity metrics. The objective is to provide a macro-level view of the systematic analysis of anonymity preservation, degradation, or elimination for data anonymization as well as network communciations anonymization.