Skip to main content

Privacy Enhancing Technologies: A Review

  • Conference paper
Electronic Government (EGOV 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2739))

Included in the following conference series:

Abstract

The spread and development of e-Government services caused significant interest in maintaining security, trust and privacy. This paper presents a state-of-the-art review of the widely accepted Privacy Enhancing Technologies (PETs). A strict classification of several parameters is performed in order to conduct a comparative analysis among Anonymizer, Crowds, Onion Routing, TRUSTe, P3P, LPWA, Hordes and Freedom. The selection of the comparison criteria is relevant to Security Threats, Technological Issues and User Demands.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Osorio, C.A.: A new framework for the analysis of solutions for privacy – enhanced Internet commerce. eJeta-PRIVACY (2001)

    Google Scholar 

  2. Levine, B.N., Shields, C.: A Protocol for Anonymous Communication Over the Internet. In: Conference on Computer and Communications Security. Proceedings of the 7th ACM conference on Computer and communications security, Athens, Greece (2000)

    Google Scholar 

  3. Reiter, M., Rubin, A.: Crowds: Anonymity for Web transactions. ACM Transactions on Information and System Security, 1 (1998)

    Google Scholar 

  4. McCullagh, A.: The establishment of trust in the electronic commerce environment. In: The Proc. of the Information Industry Outlook Conference, Australia (1998)

    Google Scholar 

  5. Goldberg, I., Wagner, D., Brewer, E.: Privacy-enhancing technologies for the Internet. In: Proc. of IEEE COMPCON 1997 Conference (1997)

    Google Scholar 

  6. Boucher, P., Shostack, A., Goldberg, I.: Freedom System 2.0 Architecture. Zero- Knowledge Systems, Inc. (2000)

    Google Scholar 

  7. The Platform for Privacy Preferences 1.0 Spec, W3C Candidate Recommendation 15 (2000)

    Google Scholar 

  8. Cranor, L.: Internet privacy. Com. of the ACM 42(2), 29–66 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Argyrakis, J., Gritzalis, S., Kioulafas, C. (2003). Privacy Enhancing Technologies: A Review. In: Traunmüller, R. (eds) Electronic Government. EGOV 2003. Lecture Notes in Computer Science, vol 2739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10929179_51

Download citation

  • DOI: https://doi.org/10.1007/10929179_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40845-1

  • Online ISBN: 978-3-540-45239-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics