A Policy based approach for the management of Web browser resources to prevent anonymity attacks in Tor

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Web browsers are becoming the universal interface to reach applications and services related with these systems. Different browsing contexts may be required in order to reach them, e.g., use of VPN tunnels, corporate proxies, anonymisers, etc. By browsing context we mean how the user browsers the Web, including mainly the concrete configuration of its browser. When the context of the browser changes, its security requirements also change. In this work, we present the use of authorisation policies to automatise the process of controlling the resources of a Web browser when its context changes. The objective of our proposal is oriented towards easing the adaptation to the security requirements of the new context and enforce them in the browser without the need for user intervention. We present a concrete application of our work as a plug-in for the adaption of security requirements in Mozilla/Firefox browser when a context of anonymous navigation through the Tor network is enabled. © IFIP International Federation for Information Processing 2009.

Cite

CITATION STYLE

APA

Navarro-Arribas, G., & Garcia-Alfaro, J. (2009). A Policy based approach for the management of Web browser resources to prevent anonymity attacks in Tor. In IFIP Advances in Information and Communication Technology (Vol. 297, pp. 164–175). https://doi.org/10.1007/978-3-642-01244-0_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free