Anonymous Internet Infrastructure based on PISA Agents
نویسندگان
چکیده
A vital requirement for e-commerce today is privacy. We explore the area of privacy for Agents in the Privacy Incorporated Software Agent (PISA) project. We first review existing privacy protection techniques: pseudonym systems, privacy enhancing technology (PET) and anonymous communication networks. We then propose a model for an Anonymous Internet Infrastructure (AII), an anonymous Internet based on PETAgents, and analyze several possible combinations both of network technologies and PET-Agents. Finally, we discuss the security interface issues for PISA-Agents and present a pseudonym E-commerce model based on PISA.
منابع مشابه
Analysis and Design of an Advanced Infrastructure for Secure and Anonymous Electronic Payment Systems on the Internet
Electronic payment systems are of paramount importance in our current digital society. Security and privacy constitute crucial challenges in this area. Electronic money is indeed just digital information that can easily be copied. Moreover, users automatically leave an electronic trail of all their activities in the digital world. In this thesis an advanced infrastructure for secure and anonymo...
متن کاملAnonymous Communications for Mobile Agents
Anonymous communication techniques are vital for some types of ecommerce applications. There have been several different approaches developed for providing anonymous communication over the Internet. In this paper, we review key techniques for anonymous communication and describe an alternate anonymous networking approach based on agile agents intended to provide anonymous communication protecti...
متن کاملAnonymous attribute certificates based on traceable signatures
Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and un...
متن کاملImplementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform’s privacy and with it the users’s anonymity. In order to address this problem, the Trusted Compu...
متن کاملAn Infrastructure for Anonymous Internet Services
Although recent research provides many techniques for anonymous web-browsing, anonymous internet services, i.e. to run a web server or file server without revealing ones identity, have received little or no attention. In this paper, we present an approach for anonymous internet services, enabling anonymous web and file servers and to run services like anonymous instant messaging and secure shel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001