scholarly journals AnoA: A Framework for Analyzing Anonymous Communication Protocols

Author(s):  
Michael Backes ◽  
Aniket Kate ◽  
Praveen Manoharan ◽  
Sebastian Meiser ◽  
Esfandiar Mohammadi

Anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity over the Internet to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing these complex systems and their different anonymity properties in a unified manner.   In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity properties for AC protocols. In addition to quantifying the (additive) advantage of an adversary in an indistinguishability-based definition, AnoA uses a multiplicative factor, inspired from differential privacy. AnoA enables a unified quantitative analysis of well-established anonymity properties, such as sender anonymity, sender unlinkability, and relationship anonymity. AnoA modularly specifies adversarial capabilities by a simple wrapper-construction, called adversary classes. We examine the structure of these adversary classes and identify conditions under which it suffices to establish anonymity guarantees for single messages in order to derive guarantees for arbitrarily many messages. This then leads us to the definition of Plug’n’Play adversary classes (PAC), which are easy-to-use, expressive, and satisfy this condition. We prove that our framework is compatible with the universal composability (UC) framework and show how to apply AnoA to a simplified version of Tor against passive adversaries, leveraging a recent realization proof in the UC framework.

2021 ◽  
Vol 265 ◽  
pp. 07011
Author(s):  
Valeriya Bulanova ◽  
Olga Petrovskaya

This article is dedicated to the study of the issue of ensuring the accuracy of environmental information disclosure and its informational and constitutional framework. Compliance with the obligatory transparency of environmental information, as well as its accuracy, the need for and reality of observance of informational and constitutional foundations for enforcement of the rights of citizens is the subject of heated discussions. The article makes an emphasis on the nonexistence of a definition for the term “accuracy of information” in the current Russian legislation. Due to the tightening of responsibility for the dissemination of fake information on the Internet, the problem of the definition of “the accuracy of environmental information” takes on special significance. The author calls attention to the facts of untimely disclosure of information about a number of environmental disasters and to the need for improvement of information and legal mechanisms.


2018 ◽  
Vol 14 (1) ◽  
pp. 91-98
Author(s):  
Marcin Świtoniak ◽  
Dawid Augustyniak ◽  
Przemysław Charzyński

Abstract The aim of this paper is to assess the quality and correctness of information on Polish soils available on selected websites. Particular attention was paid to educational portals, which became the subject of evaluation of the information its contains in terms of the correctness, up-to-dateness and reliability. Twenty-five websites representing educational portals and blogs were selected for analysis in terms of their contents (type of subject matter) correctness (substantial value), curentness (presence of up-to-date information) and completeness. Most of the information on the evaluated educational portals is targeted at high school students. These websites present only basic content. The most frequent issues on the analyzed portals were: soil types and soil systematics, distribution of soils in Poland, definition of soil and also soil valuation classes. Websites addressed to university students constitute a decided minority, could be said, that even an exception. One of those is article on Wikipedia, which has the highest educational value among all analysed websites.


2014 ◽  
Vol 1 ◽  
Author(s):  
Allison Klempka ◽  
Arielle Stimson

Internet Trolls are an online subculture who participate in posting upsetting or shocking content, harassing users, and spreading false information for their own enjoyment. As of the time of this study, research is limited on the trolling culture, the perception of trolls, and trolling behavior. The researchers have investigated trolling culture, as well as conducted a study in which subjects were asked to relay their emotional reactions to a selection of online comments, and mark the comments they considered to be trolling behavior. The results were meant to discover whether subjects of different age generations differed in their perception and definition of trolls. The results clarified that trolling was frequently associated with poor behavior, although the degree of disapproval and definitions for trolling varied between age groups.


2020 ◽  
Vol 8 ◽  
Author(s):  
Juan G. Diaz Ochoa

It is common to consider using a data-intensive strategy as a way to develop systemic and quantitative analysis of complex systems so that data collection, sampling, standardization, visualization, and interpretation can determine how causal relationships are identified and incorporated into mathematical models. Collecting enough large datasets seems to be a good strategy in reducing bias of the collected data; but persistent and dynamic anomalies in the data structure, generated from variations in intrinsic mechanisms, can actually induce persistent entropy thus affecting the overall validity of quantitative models. In this research, we are introducing a method based on the definition of homological groups that aims at evaluating this persistent entropy as a complexity measure to estimate the observability of the systems. This method identifies patterns with persistent topology, extracted from the combination of different time series and clustering them to identify persistent bias in the data. We tested this method on accumulated data from patients using mobile sensors to measure the response of physical exercise in real-world conditions outside the lab. With this method, we aim to better stratify time series and customize models in complex biological systems.


2020 ◽  
Vol 2 (40) ◽  
Author(s):  
A. Samoylenko

The article presents the study of the use of device types in the process of training cybersecurity bachelors. The essence of the definition of cybersecurity has been clarified. The problems related to the preparation of bachelors in cybersecurity at the legislative level are characterized. The subject of the study was questions related to the types of devices used for learning on the Internet, among them: desktop computer, laptop, netbook, tablet, smartphone. The results of a three-semester study were released. A graphical comparative analysis of the dynamics of the study of the use of device types in the process of training cybersecurity bachelors is presented.Keywords: cybersecurity, vocational training, cybersecurity bachelors, device.


2018 ◽  
Author(s):  
Ronald Snijder

Introduction. This paper studies the effects of several dissemination channels in an open access environment by analysing the download data of the OAPEN Library. Method. Download data were obtained containing the number of downloads and the name of the Internet provider. Based on public information, each Internet provider was categorised. The subject and language of each book were determined using metadata from the OAPEN Library. Analysis. Quantitative analysis was done using Excel, while the qualitative analysis was carried out using the statistical package SPSS. Results. Almost three quarters of all downloads come from users who do not use the Website www.oapen.org, but find the books by other means. Qualitative analysis found no evidence that channel use was influenced by user groups or the state of users' Internet infrastructure; nor was any effect on channel use found for either the language or the subjects of the monographs. Conclusions. The results show that most readers are using the "direct download" channel, which occur if the readers use systems other than the OAPEN Library Website. This implies that making the metadata available in the user's systems, the infrastructure used on a daily basis, ensures the best results.


Author(s):  
Vladislav Yur'evich Ivanov

This article examines the theoretical problem of formulating a definition for new type of traced manifested in computer space. The subject of this research is concept of digital footprint. Special attention is paid to different approaches of forensic specialists towards interpretation of trace pattern formed as a result of a crime committed with the use of technical devices, including the Internet. Analysis is conducted on various opinions of forensic specialists dealing with this problem. The author provides and substantiates the original opinion on introduction of the term “digital footprint”. The conclusion is formulated on the need to accept digital footprint as most appropriate term for describing any type of trace manifested in computer space, including the Internet. The article also presents an original definition of such type of trace intelligible to general audience. The author indicates the trends and prospects in formation and further development of the new branch of forensic technology – “forensic examination of digital footprint". The proposed conclusions may be valuable in scientific and educational activity.


2017 ◽  
Vol 6 (5) ◽  
pp. 285
Author(s):  
Gabdulzyamil G. Zaynullin ◽  
Alfiya M. Khabibullina

<p>One of the most important issues in the study of the functioning of the Internet language is the definition of the features of each Internet genre presented in online communication, taking into account the linguocultural features of the language in question. This paper studies the genre of the Internet comments of the Arabic-speaking blogosphere and reveals its stylistic features. The most common goal of the comment is gratitude, followed by praise. We created a corpus of comments from blogs of various subjects, and then conducted the tagging, having identified the group to which we attributed a comment, depending on the subject and the communicative goal. With the help of the Lexico 3 software, the most frequent lexical units were identified, the lexical features of the comments were described, the main one being the widespread use of religionyms, and the relationship between the blog subject and the stylistic characteristics of communication was revealed. The article traces the correlation between the literary and colloquial functional style in the comments, and also draws a conclusion that the comments are of a conversational, informal character. The main devices of expressiveness that are characteristic for both network and pre-network communication were revealed, and the tendency of the analysts to observe in the comments a stable three-part composition (greeting, message, final formula). The influence of traditional Arabic rhetoric, as well as the epistolary genre, was preserved. The results of the paper can be used when studying other genres of Internet communication in Arabic and in comparative studies to create the linguistic software.</p>


Author(s):  
Denis Tikhomirov

The purpose of the article is to typologize terminological definitions of security, to find out the general, to identify the originality of their interpretations depending on the subject of legal regulation. The methodological basis of the study is the methods that made it possible to obtain valid conclusions, in particular, the method of comparison, through which it became possible to correlate different interpretations of the term "security"; method of hermeneutics, which allowed to elaborate texts of normative legal acts of Ukraine, method of typologization, which made it possible to create typologization groups of variants of understanding of the term "security". Scientific novelty. The article analyzes the understanding of the term "security" in various regulatory acts in force in Ukraine. Typological groups were understood to understand the term "security". Conclusions. The analysis of the legal material makes it possible to confirm that the issues of security are within the scope of both legislative regulation and various specialized by-laws. However, today there is no single conception on how to interpret security terminology. This is due both to the wide range of social relations that are the subject of legal regulation and to the relativity of the notion of security itself and the lack of coherence of views on its definition in legal acts and in the scientific literature. The multiplicity of definitions is explained by combinations of material and procedural understanding, static - dynamic, and conditioned by the peculiarities of a particular branch of legal regulation, limited ability to use methods of one or another branch, the inter-branch nature of some variations of security, etc. Separation, common and different in the definition of "security" can be used to further standardize, in fact, the regulatory legal understanding of security to more effectively implement the legal regulation of the security direction.


Sign in / Sign up

Export Citation Format

Share Document