Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
A secure and privacy-protecting protocol for transmitting personal information between organizations
Proceedings on Advances in cryptology---CRYPTO '86
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
On blind signatures and perfect crimes
Computers and Security
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
Proceedings of the International Conference on Cryptography: Policy and Algorithms
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
Computer Networks: The International Journal of Computer and Telecommunications Networking
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Private location-based information retrieval through user collaboration
Computer Communications
Optimized query forgery for private information retrieval
IEEE Transactions on Information Theory
Assessment of E-Commerce security using AHP and evidential reasoning
Expert Systems with Applications: An International Journal
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
A collaborative protocol for anonymous reporting in vehicular ad hoc networks
Computer Standards & Interfaces
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Hi-index | 0.06 |
In this paper we have defined an open framework to support open distributed applications where anonymous transactions based on user privileges play an important role. The goal of the framework is to provide a basis to the application level, and is presented from an open and general perspective where many different implementation schemes can fit. Moreover, we have presented a set of requirements that implementation schemes must fulfill to conform a fully anonymous privilege system, which guarantees to supported applications that anonymity will be preserved in remote transactions. Finally, we present an application scenario using the services provided by the framework in order to better show the possibilities of what this type of systems offers.