Abstract | ||
---|---|---|
Awareness of legal constraints regarding the use and provision of electronic systems, leads us to question the feasibility and applicability of technical solutions that take into account security and privacy regulations. We discuss the issue with reference to directives of the European Community and Italian legislation. In particular we study the case of e-mail, proposing a protocol that retains as many characteristics of the e-mail as possible, yet allowing for complete anonymity and proofs of correct deploy. We discuss the implications of taking anonymity to the extremes and evaluate the limits of the protocol. |
Year | DOI | Venue |
---|---|---|
2004 | 10.1145/967900.967986 | SAC |
Keywords | Field | DocType |
technical solution,electronic system,complete anonymity,privacy regulation,legal constraint,account security,italian legislation,european community,correct deploy,case study,certification,anonymity | Internet privacy,Computer science,Computer security,Mathematical proof,Legislation,Electronic systems,Anonymity,Certification,Privacy law | Conference |
ISBN | Citations | PageRank |
1-58113-812-1 | 0 | 0.34 |
References | Authors | |
5 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lavinia Egidi | 1 | 91 | 10.21 |
Giovanni Porcelli | 2 | 1 | 0.73 |