1. The Privacy Minefield
1.1. Threats to Privacy
1.2. The Battle for Supremacy over Personal Data
1.3. High-Stakes Hide-and-Seek
1.4. Summary
References
2. A Collection of Tools: The Privacy Tree
2.1. Many Privacy Enhancing Technologies
2.2. Classification (Privacy Tree)
2.3. Previous Work on Classifications for Privacy
2.4. The Selected Privacy Tree
2.5. The Remainder of this Book
References
3. Limiting Exposure by Hiding the Identity
3.1. Mix Network
3.1.1. The Basic Scheme
3.1.2. Enhancements
3.1.3. Strengths
3.1.4. Disadvantages, Limitations, and Weaknesses
3.2. Anonymous Remailer
3.2.1. The Basic Scheme
3.2.2. Enhancements
3.2.3. Strengths
3.2.4. Disadvantages, Limitations, and Weaknesses
3.3. Onion Routing and Tor
3.3.1. The Basic Scheme
3.3.2. Enhancements
3.3.3. Strengths
3.3.4. Disadvantages, Limitations, and Weaknesses
3.4. Summary
References
4. Limiting Exposure by Hiding the Action
4.1. Transport Layer Security (SSL/TLS)
4.1.1. The Basic Scheme
4.1.2. Enhancements
4.1.3. Strengths
4.1.4. Disadvantages, Limitations, and Weaknesses
4.2. Network Layer Security (IPsec in Transport Mode)
4.2.1. The Basic Scheme
4.2.2. Enhancements
4.2.3. Strengths
4.2.4. Disadvantages, Limitations, and Weaknesses
4.3. Private Information Retrieval (PIR)
4.3.1. The Basic Scheme
4.3.2. Enhancements
4.3.3. Strengths
4.3.4. Disadvantages, Limitations, and Weaknesses
4.4. Summary
References
5. Limiting Exposure by Hiding the Identity-Action Pair
5.1. Network Layer Security (IPsec in Tunnel Mode)
5.1.1. The Basic Scheme
5.1.2. Enhancements
5.1.3. Strengths
5.1.4. Disadvantages, Limitations, and Weaknesses
5.2. Off-the-Record (OTR) Messaging
5.2.1. The Basic Scheme
5.2.2. Enhancements
5.2.3. Strengths
5.2.4. Disadvantages, Limitations, and Weaknesses
5.3. Summary
References
6. Limiting Disclosure by Hiding the Identity
6.1. k-Anonymity
6.1.1. The Basic Scheme
6.1.2. Enhancements
6.1.3. Strengths
6.1.4. Disadvantages, Limitations, and Weaknesses
6.2. Credential Systems
6.2.1. The Basic Scheme
6.2.2. Enhancements
6.2.3. Strengths
6.2.4. Disadvantages, Limitations, and Weaknesses
6.3. Summary
References
7. Limiting Disclosure by Hiding the Attribute
7.1. Database Protection A
About the Author: Carlisle Adams is a Professor in the School of Electrical Engineering and Computer Science (EECS) at University of Ottawa. Prior to his academic appointment in 2003, he worked for 13 years in industry (Nortel, Entrust) in the design and international standardization of a variety of cryptographic and security technologies for the Internet. Dr. Adams' research interests include all aspects of applied cryptography and security. Particular areas of interest and technical contributions include the design and analysis of symmetric encryption algorithms (including the CAST family of symmetric ciphers), the design of large-scale infrastructures for authentication (including secure protocols for authentication and certificate management in Public Key Infrastructure (PKI) environments), and comprehensive architectures and policy languages for access control in electronic networks (including X.509 attribute certificates and the XACML policy language).
Dr. Adams has maintained a long-standing interest in the creation of effective techniques to preserve and enhance privacy on the Internet. His contributions in this area include techniques to add delegation, non-transferability, and multi-show to Digital Credentials, architectures to enforce privacy in web-browsing environments, and mechanisms to add privacy to location-based services and blockchains. He was Co-Chair of the international conference Selected Areas in Cryptography (1997, 1999, 2007, and 2017), and was General Chair of the 7th International Privacy Enhancing Technologies Symposium (2007).
He lives in Ottawa with his wife and children and enjoys music, good food, and classic movies (old and new).