Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information hiding, anonymity and privacy: a modular approach
Journal of Computer Security - Special issue on WITS'02
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Proceedings of the second ACM workshop on Digital identity management
Does additional information always reduce anonymity?
Proceedings of the 2007 ACM workshop on Privacy in electronic society
On the Impact of Social Network Profiling on Anonymity
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Using Linkability Information to Attack Mix-Based Anonymity Services
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Evaluating adversarial partitions
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Relations among privacy notions
ACM Transactions on Information and System Security (TISSEC)
Modeling identity-related properties and their privacy strength
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Short paper: the NetSANI framework for analysis and fine-tuning of network trace sanitization
Proceedings of the fourth ACM conference on Wireless network security
Hi-index | 0.01 |
Within a privacy-enhancing identity management system, among other sources of information, knowledge about current anonymity and about linkability of user's actions should be available, so that each user is enabled to make educated decisions about performing actions and disclosing PII (personal identifiable information). In this paper I describe a framework for quantification of anonymity and linkability of a user's actions for use within a privacy-enhancing identity management system. Therefore, I define a model of user's PII and actions as well as an attacker model. Based thereon, I describe an approach to quantify anonymity and linkability of actions. Regarding practical applicability, a third party service for linkability quantification is discussed.