Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/543482.543507acmconferencesArticle/Chapter ViewAbstractPublication PagescfpConference Proceedingsconference-collections
Article

Reputation in privacy enhancing technologies

Published: 16 April 2002 Publication History

Abstract

Reputation is the linchpin of a dynamic and pseudonymous future. In a networked world where individuals interact via anonymous remailers, and where the online services they use are themselves provided by an ever-changing pool of semi-anonymous users, the distinction between pseudonym and identity blurs. In this world, reputation is one of the few tools that can still provide trust --- trust among the users of distributed services, and even the trust necessary to maintain reliability and accountability of these services.

References

[1]
R. Dingledine, M. J. Freedman, D. Hopwood, and D. Molnar. "A Reputation System to Increase MIX-Net Reliability", Information Hiding, 4th International Workshop, I. S. Moskowitz (ed.), Springer-Verlag, LNCS 2137, April 2001.]]
[2]
R. Dingledine, M. J. Freedman, and D. Molnar. "The Free Haven Project: Distributed Anonymous Storage Service", Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, H. Federrath (ed.), Springer-Verlag, LNCS 2009, July 2000.]]
[3]
R. Dingledine, and P. Syverson. "Reliable MIX Cascade Networks through Reputation", Financial Cryptography, 6th International Conference, M. Blaze (ed.), Springer-Verlag, LNCS, March 2002.]]
[4]
P. Syverson, S. Stubblebine, and D. Goldschlag. "Unlinkable Serial Transactions", Financial Cryptography, 1st International Conference, R. Hirschfeld (ed.), Springer-Verlag, LNCS 1318, February 1997.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CFP '02: Proceedings of the 12th annual conference on Computers, freedom and privacy
April 2002
182 pages
ISBN:158113505X
DOI:10.1145/543482
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 April 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

CFP02
Sponsor:
CFP02: 12th Conference on Computers. Freedom & Privacy
April 16 - 19, 2002
California, San Francisco

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2018)PETs and their usersIdentity in the Information Society10.1007/s12394-010-0073-83:3(539-563)Online publication date: 11-Dec-2018
  • (2017)The nature of sellers' cyber credit in C2C e-commerceElectronic Commerce Research10.1007/s10660-016-9231-x17:1(133-147)Online publication date: 1-Mar-2017
  • (2013)Privacy Preserving Reputation Management in Social NetworksSecurity and Privacy Preserving in Social Networks10.1007/978-3-7091-0894-9_8(245-280)Online publication date: 14-Aug-2013
  • (2010)PETs in the Surveillance Society: A Critical Review of the Potentials and Limitations of the Privacy as Confidentiality ParadigmData Protection in a Profiled World10.1007/978-90-481-8865-9_19(301-321)Online publication date: 3-Aug-2010
  • (2004)Pseudonymity in the light of evidence-based trustProceedings of the 12th international conference on Security Protocols10.1007/11861386_31(267-274)Online publication date: 26-Apr-2004

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media