Levels of Anonymity

In this paper we make a rst attempt at systematically investigating levels of anonymity required in networked computer systems: we feel it is often overlooked that beyond such o b vious cases as identiied by means of a password" or "anonymous use" there are many other levels of anonymity, identiication and authenticity necessary in various applications.