Levels of Anonymity
Bill Flinn (Computer Science Department, University of Auckland, New Zealand)
Hermann Maurer (Institute for Information Processing and Computer Supported New Media, Graz University of Technology, Austria)
Abstract: In this paper we make a first attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such obvious cases as identified by means of a password or anonymous use there are many other levels of anonymity, identification and authenticity necessary in various applications.
Keywords: access control, anonymous use, authentication, big brother, security
Categories: C.2.0, D.4.6, K.6.5