A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Protecting privacy with protocol stack virtualization
2008
Proceedings of the 7th ACM workshop on Privacy in the electronic society - WPES '08
Previously proposed host-based privacy protection mechanisms use pseudorandom or disposable identifiers on some or all layers of the protocol stack. These approaches either require changes to all hosts participating in the communication or do not provide privacy for the whole protocol stack or the system. Building on previous work, we propose a relatively simple approach: protocol stack virtualization. The key idea is to provide isolation for traffic sent to the network. The granularity of the
doi:10.1145/1456403.1456416
dblp:conf/wpes/LindqvistT08
fatcat:m5jtubrjubfxndv7rvfdlr236i