Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Virtual network stacks: from theory to practice
Publication

Publications

Virtual network stacks: from theory to practice

Title
Virtual network stacks: from theory to practice
Type
Article in International Scientific Journal
Year
2012
Authors
Matos, A
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Ferreira, R
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Aguiar, RL
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Journal
Vol. 5 No. 9
Pages: 738-751
ISSN: 1939-0114
Publisher: Hindawi
Indexing
Publicação em ISI Web of Knowledge ISI Web of Knowledge - 0 Citations
Publicação em Scopus Scopus - 0 Citations
Other information
Authenticus ID: P-002-8ME
Abstract (EN): Privacy is becoming a pressing requirement that spawns across different network layers and user interactions. Using multiple identifiers for the same user, pseudonyms, as means for preserving privacy, is becoming an important approach that has not seen proper discussion or validation. This paper presents formalization on pseudonymity specially considering its influence on the network stack. It presents a study on privacy requirements and its implementation cost, both at theoretical and practical levels, through the support of multiple network stack instantiations and network identifiers per user. We discuss how pseudonyms can be used to preserve users' privacy, and what key issues and requirements are needed, to use, control, and evaluate a pseudonym-based solution at network level. The paper further presents an architecture that builds a pseudonym-based solution supported throughout the network stack, describes its implementation in a real testbed, and depicts the results obtained related to both efficiency and costs of such a privacy approach. Finally, it discusses the characteristics of the architecture according to the identified privacy requirements, its impacts and constraints. Copyright (C) 2011 John Wiley & Sons, Ltd.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 14
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Security and privacy issues for the network of the future (2012)
Another Publication in an International Scientific Journal
G. F. Marias; João Barros; M. Fiedler; A. Fischer; H. Hauff; R. Herkenhoener; A. Grillo; A. Lentini; Luísa Lima; C. Lorentzen; W. Mazurczyk; Hermann de Meer; Paulo Oliveira; George C. Polyzos; Enric Pujo; Krzysztof Szczypiorski; João P. Vilela; Tiago Vinhoza
Clustering VoIP caller for SPIT identification (2016)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Arshad, J; Salah, K
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-23 at 20:39:47 | Privacy Policy | Personal Data Protection Policy | Whistleblowing