Show simple item record

dc.contributor.authorRady, Mina
dc.date.accessioned2022-04-04T05:09:45Z
dc.date.available2022-04-04T05:09:45Z
dc.date.issued2012-11-06
dc.identifier.urihttps://hdl.handle.net/1721.1/141615
dc.descriptionPoster presented in the workshop on “Who Controls Cyberspace,” MIT, Cambridge, MA, United States, November 6-7, 2012.en_US
dc.description.abstractAnonymity networks have played major roles in censorship circumvention and various benign or malicious activities in the cyber domain. Hence, those networks became well defined targets of repressive regimes or law enforcement. In this research, we attempt to infer the various control capacities over the operation of such networks and we take the Tor network as an example. We decompose the operation and process of Tor network across the Cyberspace layers. Then we do survey of existing literature about possible control mechanisms over various locations in the network. Then we extrapolate from the control actions to infer possible political actors who would be able to exercise each control action. We use Tor network model as the subject of this investigation due to its distinctive pervasiveness. We conclude with a comprehensive model that depcits distribution of control capacities across the actors at different political levels of analysis.
dc.description.sponsorshipThis material is based upon work supported by the Office of Naval Research under Grant No. N00014-09-1-0597. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research.en_US
dc.language.isoen_USen_US
dc.publisherExplorations in Cyber International Relationsen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.titleWho controls anonymity? Control point analysis of the Onion routing anonymity network (TOR)en_US
dc.typeOther (Poster)en_US
dc.identifier.citationRady, M. (2012, November 6–7). Who controls anonymity? Control point analysis of the Onion routing anonymity network (TOR) [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.en_US
dc.eprint.versionFinal published version.en_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record