2014
DOI: 10.1016/j.comnet.2013.09.021
|View full text |Cite
|
Sign up to set email alerts
|

The design and implementation of the A3 application-aware anonymity platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 52 publications
0
5
0
Order By: Relevance
“…A path selection method in which overloaded nodes are avoided is proposed [9]. Sherr et al [10] introduce a flexible path selection design in which applications select a trade-off between performance and anonymity based on the user's specific requirements. Furthermore the notion of trust is employed in [11], [12], [13], [14] in order to increase security.…”
Section: Related Workmentioning
confidence: 99%
“…A path selection method in which overloaded nodes are avoided is proposed [9]. Sherr et al [10] introduce a flexible path selection design in which applications select a trade-off between performance and anonymity based on the user's specific requirements. Furthermore the notion of trust is employed in [11], [12], [13], [14] in order to increase security.…”
Section: Related Workmentioning
confidence: 99%
“…The Declarative Secure Distributed Systems (DS2) platform provides high-level programming abstractions for implementing secure distributed systems, achieved by unifying declarative networking and logic-based access control specifications [12]. DS2 has a wide range of applications, including reconfigurable trust management [35], secure distributed data processing [34], and tunable anonymity [51].…”
Section: Securing Distributed Systemsmentioning
confidence: 99%
“…To further illustrate the feasibility of our methods and technologies for the development of secure distributed systems, we have conceptualized and implemented the Application-Aware Anonymity (A 3 ) system [7,51], a distributed peer-topeer service that provides high-performance anonymity "for the masses". A 3 uses SeNDlog for implementing an extensible policy engine for customizing its relay selection and instantiation strategies.…”
Section: Application-aware Anonymitymentioning
confidence: 99%
See 1 more Smart Citation
“…However, different users have different needs for communication anonymity through the Internet. Current anonymous communication cannot meet the variety of anonymous needs of different users [6]. User on-demand anonymous communication is that users can dynamically adjust the anonymity level of their communication according to the sensitivity of their transmitted information, which meets the user's various anonymity needs.…”
Section: Introductionmentioning
confidence: 99%