点此搜书

当前位置:ANONYMIZATIONpdf电子书下载 > 外文
ANONYMIZATION
  • 作 者:ROLF H.WEBER AND ULRIKE I.HEINRICH
  • 出 版 社:SPRINGER
  • 出版年份:2012
  • ISBN:1447140656
  • 标注页数:73 页
  • PDF页数:80 页
  • 请阅读订购服务说明与试读!

文档类型

价格(积分)

购买连接

试读

PDF格式

6

立即购买

点击试读

订购服务说明

1、本站所有的书默认都是PDF格式,该格式图书只能阅读和打印,不能再次编辑。

2、除分上下册或者多册的情况下,一般PDF页数一定要大于标注页数才建议下单购买。【本资源80 ≥73页】

图书下载及付费说明

1、所有的电子图书为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。

2、电子图书在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)

3、所有的电子图书都是原书直接扫描方式制作而成。

1 Notion of Anonymity 1

1.1 Term and Meaning of Anonymity 1

1.2 Underlying Motivations of Anonymity 2

1.3 Characteristics of Communication 3

1.3.1 Real World 3

1.3.2 Particularities of the Online World 4

References 9

2 Anonymity Challenges in the Internet 11

2.1 Risks for Anonymous Use of Internet Services 11

2.1.1 Information Gathered by IP Addresses 11

2.1.2 Storage of Recorded Data 13

2.1.3 Insufficient Data Security Measures 13

2.2 Technical Implementation of Anonymizing Services 15

2.2.1 Privacy Enhancing Technologies in General 15

2.2.2 Anonymizing Networking Techniques 16

2.2.3 Virtue of Anonymizing Services 19

References 20

3 Legal Foundations of Anonymity 23

3.1 International Legal Framework 23

3.1.1 United Nations 24

3.1.2 OECD 26

3.1.3 Council of Europe 26

3.1.4 European Union 29

3.2 Concretization of the Human Rights Protection Regime 35

3.2.1 Correlations of Anonymity and Privacy 35

3.2.2 Protection Regime of Privacy 36

References 40

4 Limitations of Anonymization 45

4.1 Factual Reasons for State Interventions 45

4.2 State Supervision in the Public Interest in General 46

4.2.1 Legitimate State Interests 46

4.2.2 Legal Bases for State Interventions 48

4.3 Combating Cybercrime 52

4.3.1 Subject Matter of Protection 52

4.3.2 Global Cybersecurity Agenda 53

4.3.3 Cybercrime Convention of Council of Europe 55

4.3.4 EU Agenda 57

4.4 Supervising Internet Traffic by Trojan Horse Software 58

4.4.1 Use of Trojan Horse Software by the German Government 58

4.4.2 Use of Trojan Horse Software by Other Governments 63

4.4.3 Concluding Legal Assessment 65

4.5 Enforcement of Copyright 66

References 69

5 Outlook 73

购买PDF格式(6分)
返回顶部