k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Context-awareness, privacy and mobile access: a web semantic and multiagent approach
UbiMob '04 Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Towards a framework for connection anonymity
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Proceedings of the 16th international conference on World Wide Web
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Efficient attributes for anonymous credentials
Proceedings of the 15th ACM conference on Computer and communications security
A survey of state-of-the-art in anonymity metrics
Proceedings of the 1st ACM workshop on Network data anonymization
Hi-index | 0.00 |
Frequently, we analyze anonymity based on incomplete data, taking into consideration only one part of an electronic process. New models of usage involve multiple devices with varying levels of support for security (and anonymity) operating on heterogeneous networks and it is increasingly necessary to analyze anonymity in complex processes rather than one static situation. Although anonymity of data has been subject of numerous studies, there is little research yet focusing on the graduation of anonymity in complex electronic processes. This short paper identifies the issue of varying degrees of anonymity as an emerging area of research and outlines basic strategies for analyzing anonymity from the user's point of view, in environments with multiple and diverse interconnected nodes and devices and in complex processes. Rather than focus on the detailed analysis, we use the scenarios in the paper as examples to illustrate the need to decompose today's complex processes in order to assess the variability in levels or security and anonymity and make the necessary conclusions.