A Methodology for Designing Controlled Anonymous Applications

@inproceedings{Naessens2006AMF,
  title={A Methodology for Designing Controlled Anonymous Applications},
  author={Vincent Naessens and Bart De Decker},
  booktitle={SEC},
  year={2006}
}
Many anonymous applications offer unconditional anonymity to their users. However, this can provoke abusive behavior. Dissatisfied users will drop out or liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users. However, designing such applications is no sinecure. This paper presents a methodology for designing controlled anonymous environments. The methodology generates a conceptual… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
5 Citations
13 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Design patterns for modelling controlled anonymous applications

  • V. Naessens, B. De Decker
  • DistriNet Report, Dept. of Computer Science, K.U…
  • 2005
Highly Influential
3 Excerpts

Model-Based Development: MetaModelling, Transformation and Verification

  • J. de Lara, H. Vangheluwe
  • The Idea Group Inc.,
  • 2005
1 Excerpt

Petri Nets : Properties , Analysis amd Applications

  • A. Pashalidis, C. J. Mitchell.
  • Proceedings of the IEEE
  • 2005

On the role of contextual information for privacy attacks and classification

  • D. Cvrcek, V. Matyas
  • In Privacy and Security Aspects of Data Mining…
  • 2004
1 Excerpt

Similar Papers

Loading similar papers…