{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:10Z","timestamp":1740149050665,"version":"3.37.3"},"reference-count":16,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T00:00:00Z","timestamp":1318982400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"crossref","award":["215832"],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","award":["SFRH\/BD\/35903\/2007"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2012,7]]},"abstract":"ABSTRACT<\/jats:title>Privacy is becoming a pressing requirement that spawns across different network layers and user interactions. Using multiple identifiers for the same user, pseudonyms, as means for preserving privacy, is becoming an important approach that has not seen proper discussion or validation. This paper presents formalization on pseudonymity specially considering its influence on the network stack. It presents a study on privacy requirements and its implementation cost, both at theoretical and practical levels, through the support of multiple network stack instantiations and network identifiers per user. We discuss how pseudonyms can be used to preserve users' privacy, and what key issues and requirements are needed, to use, control, and evaluate a pseudonym\u2010based solution at network level. The paper further presents an architecture that builds a pseudonym\u2010based solution supported throughout the network stack, describes its implementation in a real testbed, and depicts the results obtained related to both efficiency and costs of such a privacy approach. Finally, it discusses the characteristics of the architecture according to the identified privacy requirements, its impacts and constraints. Copyright \u00a9 2011 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.368","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T09:59:05Z","timestamp":1319018345000},"page":"738-751","source":"Crossref","is-referenced-by-count":0,"title":["Virtual network stacks: from theory to practice"],"prefix":"10.1002","volume":"5","author":[{"given":"Alfredo","family":"Matos","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es Universidade de Aveiro Campus Universit\u00e1rio de Santiago 3810\u2010193 Aveiro Portugal"}]},{"given":"Rui","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es Universidade de Aveiro Campus Universit\u00e1rio de Santiago 3810\u2010193 Aveiro Portugal"}]},{"given":"Susana","family":"Sargento","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es Universidade de Aveiro Campus Universit\u00e1rio de Santiago 3810\u2010193 Aveiro Portugal"}]},{"given":"Rui L.","family":"Aguiar","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es Universidade de Aveiro Campus Universit\u00e1rio de Santiago 3810\u2010193 Aveiro Portugal"}]}],"member":"311","published-online":{"date-parts":[[2011,10,19]]},"reference":[{"key":"e_1_2_10_2_1","unstructured":"ZugenmaierA.The Freiburg Privacy Diamond. InGlobal Telecommunications Conference Globecom\u2009'03 San Francisco CA USA 2003;1501\u20131505."},{"volume-title":"Preserving privacy in mobile environments","year":"2007","author":"Matos A","key":"e_1_2_10_3_1"},{"volume-title":"Blind: a complete identity protection framework for end\u2010points","year":"2004","author":"Ylitalo A","key":"e_1_2_10_4_1"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"key":"e_1_2_10_6_1","doi-asserted-by":"crossref","unstructured":"DingledineR MathewsonN SyversonP.Tor: the second\u2010generation onion router. InSSYM'04: Proceedings of the 13th conference on USENIX Security Symposium San Diego CA USA 2004;21\u201321.","DOI":"10.21236\/ADA465464"},{"key":"e_1_2_10_7_1","first-page":"121","volume-title":"Flasche\u2014a mechanism providing anonymity for mobile users","author":"Zugenmaier A","year":"2004"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255058"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-008-9475-4"},{"key":"e_1_2_10_10_1","unstructured":"Linux Kernel.Linux containers\u2014network namespace2008. URLhttp:\/\/lxc.sourceforge.net."},{"key":"e_1_2_10_11_1","first-page":"1","volume-title":"Privacy through virtual hording","author":"Gomes D","year":"2006"},{"key":"e_1_2_10_12_1","unstructured":"CantorS KempJ PhilpottR EveM.Assertions and protocols for the OASIS Security Assertion Markup Language (SAML) V2.0March2005. URLhttp:\/\/docs.oasis\u2010open.org\/security\/saml\/v2.0\/."},{"key":"e_1_2_10_13_1","unstructured":"RecordonD BufuJ HoytJ FitzpatrickB HardtD.OpenID Authentication 2.0December2007. URLhttp:\/\/openid.net\/specs\/openid\u2010authentication\u20102_0.html."},{"volume-title":"Handbook of Applied Cryptography","year":"1996","author":"Menezes AJ","key":"e_1_2_10_14_1"},{"key":"e_1_2_10_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4342815"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.141"},{"key":"e_1_2_10_17_1","unstructured":"IEEE Std 80211\u20102007.IEEE Standard for Local and metropolitan area networks\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.Technical Report IEEE Computer Society 122007. Revision of IEEE Std 802.11\u20101999."}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.368","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T12:07:18Z","timestamp":1696680438000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,19]]},"references-count":16,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["10.1002\/sec.368"],"URL":"https:\/\/doi.org\/10.1002\/sec.368","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2011,10,19]]}}}