- 1 Bleichenbacher, D., Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A. On secure and pseudonymous client-relationships with multiple servers. In Proceedings of the Third USENIX Electronic Commerce Workshop. (Aug. 1998), 99-108. Google ScholarDigital Library
- 2 Cranor, L.F., LaMacchia, B.A. Spam! Commun. ACM 41, 8 (Aug. 1998), 74-83. Google ScholarDigital Library
- 3 Gabber, E., Gibbons, P.B., Matias, Y., Mayer, Y. How to make person-alized web browsing simple, secure, and anonymous. In Proceedings of Financial Cryptography'97. Springer-Verlag LNCS 1318, 17-31. Google ScholarDigital Library
- 4 Gabber, E., Jacobson, M., Matias, Y., Mayer, A. Curbing junk email via secure classification. Proceedings of Financial Cryptography. (Feb. 1998, Anguilla, British West Indies), Springer Verlag LNCS 1465, 198-213. Google ScholarDigital Library
- 5 Kristol, D.M., Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A. Design and implementation of the Lucent Personalized Web Assistant (LPWA). Submitted for publication.Google Scholar
- 6 Martin, D. Internet anonymizing techniques. ;login: Mag. (May 1998) 34-39.Google Scholar
- 7 P3P Architecture Working Group. General Overview of the P3P Archi-tecture. www.w3.org/TR/WD-P3P-arch.Google Scholar
- 8 Reiter, M., Rubin, A. Crowds: Anonymous Web transactions. ACM Trans. Information and System Security. To appear. www.research.att.com/projects/crowds/. Google ScholarDigital Library
- 9 Syverson, P., Goldschlag, D., Reed, M. Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Pri-vacy (1997) . Google ScholarDigital Library
Index Terms
- Consistent, yet anonymous, Web access with LPWA
Recommendations
Anonymous yet accountable access control
WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic societyThis paper introduces a novel approach for augmenting attribute-based access control systems in a way that allows them to offer fully anonymous access to resources while at the same time achieving strong accountability guarantees. We assume that users ...
Access with Fast Batch Verifiable Anonymous Credentials
Information and Communications SecurityAbstractAn anonymous credential-based access control system allows the user to prove possession of credentials to a resource guard that enforce access policies on one or more resources, whereby interactions involving the same user are unlinkable by the ...
Consistent Web site updating based on bidirectional transformation
A transformation-based Web site can keep the contents of a Web site consistent by furnishing a single database and a set of transformation programs, each generating a Web page from the database. However, when someone notices an error or stale content on ...
Comments