Skip to main content

Privacy-Enhancing Technologies

  • Reference work entry
Encyclopedia of Database Systems

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Camenisch J. and van Herreweghen E. Design and implementation of the idemix anonymous credential system. In Proc. Ninth ACM Conf. on Computer and Communications Security, 2002, pp. 21–30.

    Google Scholar 

  2. Chaum D.L. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84–88, 1981.

    Google Scholar 

  3. Chaum D.L. Security without identification: card computers to make big brother obsolete. Informatik-Spektrum, 10:262–277, 1987.

    Google Scholar 

  4. Chaum D.L. The dining cryptographers problem: unconditional sender and recipient untraceability. J. Cryptol., 1(1):65–75, 1988.

    MATH  MathSciNet  Google Scholar 

  5. Cooper D.A. and Birman K.P. Preserving privacy in a network of mobile computers. In Proc. IEEE Symp. on Security and Privacy, 1995, pp. 26–83.

    Google Scholar 

  6. Cranor L. Web Privacy with P3P. O’Reilly, Sebastopol, CA, 2002.

    Google Scholar 

  7. European Union. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L, 281:1995.

    Google Scholar 

  8. Fischer-Hübner S. IT-Security and Privacy: Design and Use of Privacy Enhancing Security Mechanisms. LNCS, vol. 1958, Springer, Berlin, 2001.

    MATH  Google Scholar 

  9. Karjoth G., Schunter M., and Waidner M. Platform for enterprise privacy practices: privacy-enabled management of customer data. In Proc. Second Workshop on Privacy Enhancing Technologies, 2002, pp. 69–84.

    Google Scholar 

  10. Organization for Economic Co-operation and Development. Guidelines on the protection of privacy and transborder flows of personal data. OECD Guidelines, 1980.

    Google Scholar 

  11. PRIME EU FP6 Project. Privacy and Identity Management for Europe. Available at: http://www.prime-project.eu/.

  12. Reed M.G., Syverson P.F., and Goldschlag D.M. Anonymous connections and onion routing. IEEE J. Select. Areas Commn., 16(4):482–494, 1998.

    Google Scholar 

  13. Registratiekamer, Information and Privacy Commissioner/Ontario. Privacy-enhancing technologies: the path to anonymity. Achtergrondstudies en Verkenningen 5B, vols. I and II, Rijswijk, 1995.

    Google Scholar 

  14. Reiter M. and Rubin A. Anonymous web transactions with crowds. Commun. ACM, 42(2):32–48, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this entry

Cite this entry

Fischer-Hübner, S. (2009). Privacy-Enhancing Technologies. In: LIU, L., ÖZSU, M.T. (eds) Encyclopedia of Database Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-39940-9_271

Download citation

Publish with us

Policies and ethics