Levels of Anonymity
            
            
               Bill Flinn (Computer Science Department, University of Auckland, New Zealand)  
              
             
            
            
               Hermann Maurer (Institute for Information Processing and Computer Supported New Media, Graz University of Technology, Austria)  
              
             
                    
            
              Abstract: In this paper we make a first attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such obvious cases as identified by means of a password  or  anonymous use  there are many other levels of anonymity, identification and authenticity necessary in various applications. 
             
            
              Keywords: access control, anonymous use, authentication, big brother, security 
             
            Categories: C.2.0, D.4.6, K.6.5  
           |