JUCS - Journal of Universal Computer Science 1(1): 35-47, doi: 10.3217/jucs-001-01-0035
Levels of Anonymity
expand article infoBill Flinn, Hermann Maurer§
‡ Computer Science Department, University of Auckland, Auckland, New Zealand§ IICM, Graz University of Technology, Austria
Open Access
In this paper we make a first attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such obvious cases as identified by means of a password or anonymous use there are many other levels of anonymity, identification and authenticity necessary in various applications.
security, anonymous use, access control, authentication, big brother