Anonymity on the Internet: why the price may be too high
Communications of the ACM - Supporting community and building social capital
Anonymity and accountability in self-organizing electronic communities
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Fair Cryptosystems
Scaling Consensus: Increasing Decentralization in Wikipedia Governance
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Accountable internet protocol (aip)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Coming of Age in Second Life: An Anthropologist Explores the Virtually Human
Coming of Age in Second Life: An Anthropologist Explores the Virtually Human
A National Goal for Cyberspace: Create an Open, Accountable Internet
IEEE Security and Privacy
The problem isn't attribution: it's multi-stage attacks
Proceedings of the Re-Architecting the Internet Workshop
On anonymity with identity escrow
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Hi-index | 0.00 |
Both anonymity and accountability play important roles in sustaining the Internet's functionality; however, there is a common misconception that increasing the anonymity of Internet identities requires diminishing their accountability, and vice versa. This paper argues that by implementing accountability mechanisms and anonymity protections at the application layer of the Internet, rather than the network layer, it is possible to develop a variety of different types of accountable-anonymous virtual identities, tailored to meet the needs of numerous, diverse online applications. Examples are drawn from several identity mechanisms used by existing applications and general design patterns for implementing accountability are discussed, with particular emphasis on designing identity investment-privilege trade-offs, conditional anonymity schemes, and aggregated, identity management systems, as well as the role of scoped identities and linked identities in promoting online accountability.