SecurityinComputingSystemsxxTableofContents2.33.2.4Computing3.13.23.32.2.7Confidentiality..........................................................................432.2.8Non-Observability....................................................................442.2.9Anonymity..........................................