Title
What next after anonymity?
Abstract
In recent years, interest has shifted from protecting the confidentiality of data to protecting the confidentiality of metadata. The police often learn more from traffic analysis than from content interception; thus anonymity becomes more important than confidentiality in the classical sense. Many researchers have been working with systems such as remailers and Tor in order to provide anonymity of various kinds against various threats. In this note we argue that it's often not enough to protect the confidentiality of metadata; we may have to protect its authenticity, availability and other properties as well.
Year
DOI
Venue
2008
10.1007/978-3-642-22137-8_29
Security Protocols Workshop
Keywords
Field
DocType
various kind,traffic analysis,recent year,content interception,classical sense,various threat
Metadata,Traffic analysis,Internet privacy,Confidentiality,Computer security,Computer science,Anonymity
Conference
Volume
ISSN
Citations 
6615
0302-9743
0
PageRank 
References 
Authors
0.34
1
2
Name
Order
Citations
PageRank
Ross J. Anderson15349971.91
Steven J. Murdoch280657.90