Описание: 1. The Privacy Minefield
1.1. Threats to Privacy
1.2. The Battle for Supremacy over Personal Data
1.3. High-Stakes Hide-and-Seek
1.4. Summary
References
2. A Collection of Tools: The Privacy Tree
2.1. Many Privacy Enhancing Technologies
2.2. Classification (Privacy Tree)
2.3. Previous Work on Classifications for Privacy
2.4. The Selected Privacy Tree
2.5. The Remainder of this Book
References
3. Limiting Exposure by Hiding the Identity
3.1. Mix Network
3.1.1. The Basic Scheme
3.1.2. Enhancements
3.1.3. Strengths
3.1.4. Disadvantages, Limitations, and Weaknesses
3.2. Anonymous Remailer
3.2.1. The Basic Scheme
3.2.2. Enhancements
3.2.3. Strengths
3.2.4. Disadvantages, Limitations, and Weaknesses
3.3. Onion Routing and Tor
3.3.1. The Basic Scheme
3.3.2. Enhancements
3.3.3. Strengths
3.3.4. Disadvantages, Limitations, and Weaknesses
3.4. Summary
References
4. Limiting Exposure by Hiding the Action
4.1. Transport Layer Security (SSL/TLS)
4.1.1. The Basic Scheme
4.1.2. Enhancements
4.1.3. Strengths
4.1.4. Disadvantages, Limitations, and Weaknesses
4.2. Network Layer Security (IPsec in Transport Mode)
4.2.1. The Basic Scheme
4.2.2. Enhancements
4.2.3. Strengths
4.2.4. Disadvantages, Limitations, and Weaknesses
4.3. Private Information Retrieval (PIR)
4.3.1. The Basic Scheme
4.3.2. Enhancements
4.3.3. Strengths
4.3.4. Disadvantages, Limitations, and Weaknesses
4.4. Summary
References
5. Limiting Exposure by Hiding the Identity-Action Pair
5.1. Network Layer Security (IPsec in Tunnel Mode)
5.1.1. The Basic Scheme
5.1.2. Enhancements
5.1.3. Strengths
5.1.4. Disadvantages, Limitations, and Weaknesses
5.2. Off-the-Record (OTR) Messaging
5.2.1. The Basic Scheme
5.2.2. Enhancements
5.2.3. Strengths
5.2.4. Disadvantages, Limitations, and Weaknesses
5.3. Summary
References
6. Limiting Disclosure by Hiding the Identity
6.1. k-Anonymity
6.1.1. The Basic Scheme
6.1.2. Enhancements
6.1.3. Strengths
6.1.4. Disadvantages, Limitations, and Weaknesses
6.2. Credential Systems
6.2.1. The Basic Scheme
6.2.2. Enhancements
6.2.3. Strengths
6.2.4. Disadvantages, Limitations, and Weaknesses
6.3. Summary
References
7. Limiting Disclosure by Hiding the Attribute
7.1. Database Protection A