World Wide Web Journal - Special issue: Web security: a matter of trust
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Computer Networks
Distributed Systems: Principles and Paradigms
Distributed Systems: Principles and Paradigms
Protecting Free Expression Online with Freenet
IEEE Internet Computing
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Accountable Anonymous Access to Services in Mobile Communication Systems
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Collaborative Reputation Mechanisms in Electronic Marketplaces
HICSS '99 Proceedings of the Thirty-second Annual Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Offline payments with auditable tracing
FC'02 Proceedings of the 6th international conference on Financial cryptography
P2P Scrabble. Can P2P Games Commence?
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
A user-centric anonymous authorisation framework in e-commerce environment
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Anonymity, accountability & John Doe
Proceedings of the 1st annual conference on Information security curriculum development
Anonymous authentication for mobile Single Sign-On to protect user privacy
International Journal of Mobile Communications
Anonymous reputation based reservations in e-commerce (amnesic)
Proceedings of the 13th International Conference on Electronic Commerce
Application-layer design patterns for accountable-anonymous online identities
Telecommunications Policy
Hi-index | 0.00 |
In this paper we study the problem of anonymity versus accountability in electronic communities. We argue that full anonymity may present a security risk that is unacceptable in certain applications; therefore, anonymity and accountability are both needed. To resolve the inherent contradiction between anonymity and accountability in a flexible manner, we introduce the concepts of internal and external accountabilities. Intuitively, internal accountability applies to virtual users only, and is governed by the policy of a group (a community). In contrast, external accountability is needed to address issues related to misuse if the activity is to be penalized in real life according to internal rules or external laws. We provide a set of protocols to ensure that users' virtual and real identities cannot be disclosed unnecessarily, and allow users to monitor the data collected about them as well as to terminate their membership (both real and virtual) under certain conditions. We develop a general conceptual model of electronic Editorial Board (e-EB). In our thinking, there are deep connections between anonymity and self-organization. In turn, the concept of self-organizing e-EB (SO-eEB) is introduced here, and a robotic example is provided. Finally, SO-eEB is specialized to Anonymous and Accountable Self-Organizing Communities (A2SOCs), that fully supports internal and external accountability while providing anonymity.