A Methodology for Designing Controlled Anonymous Applications
نویسندگان
چکیده
Many anonymous applications offer unconditional anonymity to their users. However, this can provoke abusive behavior. Dissatisfied users will drop out or liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users. However, designing such applications is no sinecure. This paper presents a methodology for designing controlled anonymous environments. The methodology generates a conceptual model that compromises between privacy requirements and control requirements. The conceptual model allows to derive performance and trust properties and easily maps to control mechanisms.
منابع مشابه
Designing Privacy-Enhancing Mobile Applications
This paper evaluates the multi-paradigm modelling methodology for designing controlled anonymous applications, like applications that use trap-door anonymity. The methodology is applied to a class of mobile applications with strong security and privacy requirements. From this study, we detect the constraints in the existing methodology in the context of mobile applications, explore the solution...
متن کاملA Methodology for Anonymity Control in Electronic Services Using Credentials
The organization of all kinds of personal and business affairs is being digitized. At the same time, the Internet is gaining importance as a basic communication mechanism, which opens up a lot of these digitized processes to outsiders. The correct operation of these applications is fundamental and security/control is more than ever a crucial concern. Yet today, the identity and on-line behavior...
متن کاملتاثیر تدریس روش تحقیق بر مبنای مراقبت مبتنی برشواهد، کاربردها و طراحی پژوهش بر شناخت، نگرش و رضایت از تدریس
Background and Objective: Traditional teaching of research methodology is associated with low learning and satisfaction but effective teaching increase professional abilities and positive attitude toward science. In this study the effect of research methodology teaching based on evidence based care, applications and research designing, on knowledge, attitude and teaching satisfaction was studie...
متن کاملMethodological Principles and Applications of the Delphi Method: A Narrative Review
Background and Objectives: The appearance of complex issues with insufficient information has resulted in the consensus or unanimity spread. The consensus methods include the nominal group and the Delphi method.The Delphi method is a systematic process to predict and help making decision through survey rounds and information gathering and finally the group consensus. This method has been design...
متن کاملAccountable Anonymous E-Mail
Current anonymous e-mail systems offer unconditional anonymity to their users which can provoke abusive behaviour. Dissatisfied users will drop out and liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users when designing anonymous applications. This paper describes the design and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006