Entry Reiter:1998:CAW from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Reiter:1998:CAW,
author = "Michael K. Reiter and Aviel D. Rubin",
title = "Crowds: anonymity for {Web} transactions",
journal = j-TISSEC,
volume = "1",
number = "1",
pages = "66--92",
month = nov,
year = "1998",
CODEN = "ATISBQ",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Tue Jul 27 17:35:45 MDT 1999",
bibsource = "http://www.acm.org/tissec/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
URL = "http://www.acm.org:80/pubs/citations/journals/tissec/1998-1-1/p66-reiter/",
abstract = "In this paper we introduce a system called Crowds for
protecting users' anonymity on the world-wide-web.
Crowds, named for the notion of ``blending into a
crowd,'' operates by grouping users into a large and
geographically diverse group (crowd) that collectively
issues requests on behalf of its members. Web servers
are unable to learn the true source of a request
because it is equally likely to have originated from
any member of the crowd, and even collaborating crowd
members cannot distinguish the originator of a request
from a member who is merely forwarding the request on
behalf of another. We describe the design,
implementation, security, performance, and scalability
of our system. Our security analysis introduces {\em
degrees of anonymity\/} as an important tool for
describing and proving anonymity properties.",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "security",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Applications (SMTP, FTP, etc.). {\bf C.2.0} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
General, Security and protection (e.g., firewalls).
{\bf K.4.1} Computing Milieux, COMPUTERS AND SOCIETY,
Public Policy Issues, Privacy. {\bf K.4.4} Computing
Milieux, COMPUTERS AND SOCIETY, Electronic Commerce,
Security.",
}
Related entries
- analysis,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- anonymity,
2(3)230,
2(4)354,
2(4)390,
11(2)3,
11(2)6,
12(3)15,
13(2)13,
13(4)29,
13(4)39,
13(4)41,
14(1)4,
14(4)29,
15(1)5,
15(3)11,
15(3)12,
15(3)14,
17(1)4
- another,
1(1)26,
11(3)13,
11(3)14,
12(1)5,
12(3)18,
13(3)26,
13(4)36,
15(3)12,
15(4)18,
18(1)1
- any,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
10(4)4,
11(2)4,
11(2)6,
11(3)13,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(3)19,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)9,
15(2)10,
15(4)17,
16(2)6,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
18(1)1
- application,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)2,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(1)2,
16(2)6,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- because,
2(3)269,
10(4)5,
11(4)18,
11(4)21,
12(1)2,
12(2)10,
14(1)3,
14(4)29,
16(2)7,
17(1)1,
17(1)4,
17(3)10
- behalf,
2(2)177,
12(3)15
- C.2.0,
2(2)159,
2(3)230,
2(3)269
- C.2.2,
2(2)159,
2(3)332
- called,
1(1)3,
2(1)105,
2(2)177,
2(3)269,
10(1)4,
11(1)3,
11(3)14,
12(3)15,
13(1)10,
13(3)26,
13(3)27,
14(1)13,
14(4)28,
15(1)2,
15(2)9,
15(4)18,
16(2)6,
17(1)2,
17(3)10,
17(4)16,
18(1)3
- cannot,
2(2)177,
10(2)7,
11(3)12,
11(3)13,
12(1)5,
12(2)9,
12(3)14,
13(3)20,
13(4)39,
14(3)27,
15(2)6,
15(2)9,
15(4)17,
16(1)3,
16(4)16
- collectively,
10(1)3,
17(2)8
- COMMUNICATION, COMPUTER-,
2(1)34,
2(1)105
- computer,
2(1)34,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)416,
10(2)5,
11(4)20,
12(2)7,
13(2)11,
15(1)1,
15(2)9,
16(2)5,
17(2)6
- COMPUTER-COMMUNICATION,
2(1)34,
2(1)105
- computing,
1(1)3,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
10(4)3,
11(1)3,
11(2)2,
12(1)6,
12(2)8,
12(3)15,
13(3)25,
16(3)11,
18(3)11
- degree,
9(4)461,
12(1)6
- describe,
2(1)3,
2(1)34,
2(1)105,
2(2)159,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
7(2)319,
10(4)3,
11(4)21,
12(1)1,
12(2)11,
12(3)16,
12(4)21,
13(4)30,
13(4)34,
14(3)24,
14(3)27,
15(3)11,
15(3)13,
16(3)10,
16(3)12,
16(4)14,
17(2)5,
18(2)8
- describing,
15(1)2
- design,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
2(4)416,
10(2)7,
10(3)11,
10(4)1,
11(1)2,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
14(3)24,
15(3)13,
16(2)5,
16(2)6,
16(2)8,
16(4)16,
17(1)4,
17(2)7,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- distinguish,
16(3)12,
17(1)2,
18(3)9
- diverse,
11(3)14
- e.g.,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
10(4)1,
11(4)22,
12(1)1,
12(2)10,
12(2)12,
14(1)2,
15(2)6,
16(2)7,
16(4)14,
17(1)1,
17(3)12,
17(4)15,
18(3)9
- electronic,
13(4)39,
15(1)4,
17(3)12
- equally,
12(1)2
- etc.,
15(2)7,
16(4)14,
17(3)12
- even,
2(3)332,
2(4)416,
10(1)2,
11(1)4,
11(2)6,
11(4)22,
12(2)11,
12(4)20,
13(1)10,
13(4)30,
13(4)35,
13(4)41,
14(3)25,
14(3)27,
15(1)5,
16(3)12,
17(3)11,
17(3)12,
18(1)1
- firewall,
2(3)230,
2(3)269,
15(4)16
- general,
2(1)65,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
9(2)181,
9(4)391,
10(1)2,
10(4)1,
11(1)3,
12(1)2,
12(1)5,
12(3)18,
12(4)20,
13(3)28,
15(1)2,
15(3)13,
16(1)2,
16(1)4,
16(2)7,
17(1)3,
17(1)4,
18(1)3,
18(3)10,
18(4)12
- geographically,
10(1)2
- group,
2(4)354,
3(3)136,
4(3)289,
4(4)371,
6(4)547,
7(1)60,
7(3)457,
7(4)523,
10(3)10,
11(1)3,
11(4)18,
11(4)23,
12(1)4,
13(4)34,
14(1)4,
14(3)23,
14(4)28,
16(1)4,
17(1)4
- grouping,
11(4)18
- have,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- implementation,
1(1)3,
1(1)26,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
7(2)319,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)1,
16(1)2,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- important,
1(1)3,
2(3)295,
10(2)8,
11(3)14,
11(4)18,
11(4)20,
12(1)4,
13(3)26,
13(3)27,
13(4)36,
14(4)28,
15(3)12,
15(4)18,
16(1)4,
17(3)11
- introduce,
1(1)93,
2(3)230,
2(4)390,
9(2)162,
10(1)2,
10(1)3,
10(4)2,
11(2)5,
11(3)12,
11(4)17,
12(1)1,
12(1)3,
12(1)5,
12(2)13,
12(3)14,
12(3)15,
12(4)20,
13(3)24,
13(3)27,
13(4)32,
14(1)3,
14(1)12,
15(1)2,
16(2)7,
16(3)9,
16(3)12,
16(4)17,
17(2)7,
17(3)9
- issue,
2(1)65,
2(4)354,
8(4)349,
10(1)1,
10(3)12,
11(1)2,
12(1)5,
12(2)7,
12(3)15,
12(4)22,
13(1)1,
13(2)11,
13(3)22,
13(3)26,
13(4)32,
15(1)1,
15(2)7,
16(2)7,
16(3)12,
17(1)1,
17(1)2
- large,
2(1)65,
9(4)391,
11(1)4,
11(3)15,
12(2)13,
13(4)32,
14(1)12,
14(1)13,
14(3)25,
15(1)4,
15(3)14,
15(4)15,
16(2)8,
16(4)14,
17(3)10,
17(3)11,
18(4)14
- learn,
10(3)10,
13(1)10,
15(4)15
- likely,
12(2)11,
13(3)25,
14(1)2,
15(3)14,
15(4)15,
16(2)8,
17(2)8
- member,
2(1)105,
11(3)15
- Milieux,
1(1)3,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)354,
2(4)390
- NETWORKS,
2(1)34,
2(1)105
- notion,
2(1)65,
2(3)230,
9(2)181,
10(1)3,
10(4)2,
12(1)1,
12(1)6,
12(2)8,
12(4)20,
13(3)24,
13(3)27,
13(4)36,
14(1)4,
14(4)30,
16(1)3,
17(2)7,
18(2)8,
18(3)10
- operate,
12(4)22,
13(4)30
- organization,
2(1)34,
2(1)65,
2(1)105,
2(2)159,
2(3)230,
2(3)269,
2(3)332,
2(4)416,
9(2)113,
9(4)391,
10(4)2,
11(1)3,
12(3)15,
14(3)23,
14(3)25
- paper,
1(1)93,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)269,
2(4)390,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)4,
11(1)2,
11(2)1,
11(2)6,
12(2)12,
14(4)28,
14(4)32
- performance,
1(1)3,
1(1)26,
2(3)269,
4(3)289,
5(4)458,
7(3)457,
9(4)461,
10(1)3,
10(4)4,
11(1)2,
11(1)3,
11(2)1,
11(4)17,
11(4)19,
12(3)14,
12(3)16,
13(3)24,
13(3)25,
13(4)32,
13(4)35,
13(4)38,
14(1)3,
15(1)4,
16(1)1,
16(2)6,
16(2)8,
16(3)9,
16(4)16,
17(1)1,
17(2)8,
17(3)9,
17(4)13,
17(4)15
- privacy,
2(4)390,
7(2)319,
10(3)12,
11(2)3,
11(2)6,
11(3)16,
12(1)6,
12(2)8,
12(2)9,
12(3)16,
12(4)21,
13(1)7,
13(2)16,
13(3)22,
13(3)24,
13(4)39,
14(1)4,
14(3)26,
14(4)29,
14(4)30,
14(4)31,
15(2)7,
15(3)12,
16(3)11,
16(3)12,
17(1)3,
17(3)10,
18(1)2,
18(4)12
- property,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(1)2,
11(3)12,
11(3)13,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(3)19,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)9,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
16(2)5,
17(1)3,
17(1)4,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- protecting,
2(3)269,
2(4)354,
10(4)3,
13(3)22,
15(2)9
- protection,
1(1)3,
1(1)26,
1(1)93,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)295,
2(4)354,
2(4)390,
10(1)3,
10(3)9,
11(4)20,
12(2)9,
12(2)11,
13(3)22,
14(3)24,
15(1)2,
15(2)8,
16(2)6
- proving,
8(3)287,
12(2)8,
13(3)25,
17(4)15
- public,
2(2)138,
2(3)230,
4(4)453,
7(1)21,
10(3)10,
11(2)4,
11(3)16,
12(1)3,
12(3)16,
12(3)18,
12(4)22,
16(4)15,
17(2)5,
17(3)10
- Reiter, Michael K.,
2(2)138,
4(4)453,
12(2)11,
14(1)2,
14(1)13,
14(4)32,
15(2)9,
17(2)8
- request,
10(1)3,
11(2)3,
13(3)20,
14(1)2,
14(1)8,
14(1)9,
16(4)13,
16(4)14,
16(4)17,
17(1)2
- Rubin, Aviel D.,
7(2)319
- scalability,
2(1)105,
2(4)390,
9(4)391,
12(1)3,
12(3)16
- server,
2(1)34,
2(3)230,
2(4)390,
10(4)4,
11(2)2,
11(2)5,
11(3)14,
12(2)10,
12(3)14,
12(3)16,
12(3)17,
12(4)21,
14(1)3,
14(1)12,
14(4)29,
16(4)13,
16(4)15,
17(2)5,
17(4)15,
18(1)1
- source,
5(3)238,
12(2)11,
12(2)13,
13(1)8,
13(3)21,
14(1)8,
14(3)23,
14(3)25,
15(2)6,
15(3)13,
18(4)12
- tool,
2(3)332,
2(4)390,
7(2)274,
9(2)181,
10(4)2,
12(2)10,
13(3)24,
13(3)26,
13(4)30,
13(4)40,
14(1)6,
15(1)3,
15(4)18,
16(1)4,
16(2)7,
17(2)7,
18(1)1,
18(1)4
- transaction,
1(1)26,
2(4)354,
4(4)321,
13(3)20,
17(3)10,
18(1)2
- true,
2(4)390,
12(2)10
- unable,
16(3)12
- web,
2(1)34,
2(4)390,
4(1)37,
10(2)8,
10(3)12,
11(1)4,
11(2)3,
11(3)15,
12(2)12,
12(3)17,
13(4)39,
14(2)21,
14(3)26,
16(4)13,
16(4)14,
16(4)16,
18(1)1
- who,
1(1)26,
10(4)3,
11(3)12,
11(4)19,
11(4)23,
12(1)2,
12(2)9,
13(4)39,
13(4)40,
15(3)14,
16(2)8,
17(1)4,
18(4)13