Abstract
In this paper we make a first attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such obvious cases as identified by means of a password or “anonymous use” there are many other levels of anonymity, identification and authenticity necessary in various applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
D. Chaum: Security without Identification: Transaction Systems to make Big Brother obsolete, Communications of the ACM, October 1985, pp 1030–1044.
L. Detweiler: Privacy and Anonymity on the Internet FAQ, sci. crypt. newsgroup (Internet),
Lindsy van Gelder: The Strange Case of the Electronic Lover, Ms Magazine, October 1985, pp 364–375.
F. Kappe, H. Maurer, N. Scherbakov: Hyper-G - A Universal Hypermedia System, J. EMH 2, 1 (1993), 39 - 66.
J. Lennon, H. Maurer: Lecturing Technology - A Future with Hypermedia, to appear in: Educational Technology (1994).
H.A. Maurer, N. Rozsenich, and I. Sebestyen : Videotex without “Big Brother”, Electronic Publishing Review 1984, Vol. 4, No. 3.
H. Maurer: Privacy and security on videotex systems, New Media: Communication Technologies for the 1990s.
H. Maurer: Why Hypermedia Systems Are Important, LNCS 6022,Springer Pub.Co. (1992), 1–15.
Die Elektronischen Scherben, Maurer’s Meinung 153, Austrian Videotex *MAURER###4.
J. Nunamaker, A. Dennis, J. Valacich, D. Vogel, J. George: Electronic Meeting Systems to Support Group Work, Communications of the ACM, 34, 7 (1991), pp 40–61.
A. Salomaa: Public Key Cryptography, EATCS Monographs 23, Springer-Verlag 1990.
J. Sheffield: The Impact of Electronic Meeting Systems on New Zealand Organisations, Vol 1 of Proceedings of the 13th New Zealand Computer Society Conference, John Hosking ED., NZCS (1993), pp 21 - 40.
Time Magazine: Who Should Keep The Keys?; Time Magazin March 14 (1994), 38–39.
P. Visotschnigg: Verstaendigung im machtfreien Raum; P. Zolnay Pub Co Vienna (1985)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 Springer Pub. Co.
About this chapter
Cite this chapter
Flinn, B., Maurer, H. (1996). Levels of Anonymity. In: Maurer, H., Calude, C., Salomaa, A. (eds) J.UCS The Journal of Universal Computer Science. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-80350-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-80350-5_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-80352-9
Online ISBN: 978-3-642-80350-5
eBook Packages: Springer Book Archive