Anonymous Internet Infrastructure based on PISA Agents

نویسندگان

  • Ronggong Song
  • Larry Korba
چکیده

A vital requirement for e-commerce today is privacy. We explore the area of privacy for Agents in the Privacy Incorporated Software Agent (PISA) project. We first review existing privacy protection techniques: pseudonym systems, privacy enhancing technology (PET) and anonymous communication networks. We then propose a model for an Anonymous Internet Infrastructure (AII), an anonymous Internet based on PETAgents, and analyze several possible combinations both of network technologies and PET-Agents. Finally, we discuss the security interface issues for PISA-Agents and present a pseudonym E-commerce model based on PISA.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis and Design of an Advanced Infrastructure for Secure and Anonymous Electronic Payment Systems on the Internet

Electronic payment systems are of paramount importance in our current digital society. Security and privacy constitute crucial challenges in this area. Electronic money is indeed just digital information that can easily be copied. Moreover, users automatically leave an electronic trail of all their activities in the digital world. In this thesis an advanced infrastructure for secure and anonymo...

متن کامل

Anonymous Communications for Mobile Agents

Anonymous communication techniques are vital for some types of ecommerce applications. There have been several different approaches developed for providing anonymous communication over the Internet. In this paper, we review key techniques for anonymous communication and describe an alternate anonymous networking approach based on agile agents intended to provide anonymous communication protecti...

متن کامل

Anonymous attribute certificates based on traceable signatures

Purpose – To provide a cryptographic protocol for anonymously accessing services offered on the web. Such anonymous accesses can be disclosed or traced under certain conditions. Design/methodology/approach – The “traceable signature” scheme was used in conjunction with the “privilege management infrastructure”. Findings – The cryptographic primitive provides a suitable tool for anonymous and un...

متن کامل

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms

Anonymity and privacy protection are very important issues for Trusted Computing enabled platforms. Protection mechanisms are required in order to hide activities of the trusted platforms when performing cryptography based transactions over the Internet, which would otherwise compromise the platform’s privacy and with it the users’s anonymity. In order to address this problem, the Trusted Compu...

متن کامل

An Infrastructure for Anonymous Internet Services

Although recent research provides many techniques for anonymous web-browsing, anonymous internet services, i.e. to run a web server or file server without revealing ones identity, have received little or no attention. In this paper, we present an approach for anonymous internet services, enabling anonymous web and file servers and to run services like anonymous instant messaging and secure shel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001