Hostname: page-component-78c5997874-m6dg7 Total loading time: 0 Render date: 2024-11-17T06:58:50.824Z Has data issue: false hasContentIssue false

A survey of privacy in multi-agent systems

Published online by Cambridge University Press:  03 May 2013

Jose M. Such
Affiliation:
Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València, Camí de Vera s/n, 46022 València, Spain; e-mail: jsuch@dsic.upv.es, aespinos@dsic.upv.es, agarcia@dsic.upv.es
Agustín Espinosa
Affiliation:
Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València, Camí de Vera s/n, 46022 València, Spain; e-mail: jsuch@dsic.upv.es, aespinos@dsic.upv.es, agarcia@dsic.upv.es
Ana García-Fornes
Affiliation:
Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València, Camí de Vera s/n, 46022 València, Spain; e-mail: jsuch@dsic.upv.es, aespinos@dsic.upv.es, agarcia@dsic.upv.es

Abstract

Privacy has been a concern for humans long before the explosive growth of the Internet. The advances in information technologies have further increased these concerns. This is because the increasing power and sophistication of computer applications offers both tremendous opportunities for individuals, but also significant threats to personal privacy. Autonomous agents and multi-agent systems are examples of the level of sophistication of computer applications. Autonomous agents usually encapsulate personal information describing their principals, and therefore they play a crucial role in preserving privacy. Moreover, autonomous agents themselves can be used to increase the privacy of computer applications by taking advantage of the intrinsic features they provide, such as artificial intelligence, pro-activeness, autonomy, and the like. This article introduces the problem of preserving privacy in computer applications and its relation to autonomous agents and multi-agent systems. It also surveys privacy-related studies in the field of multi-agent systems and identifies open challenges to be addressed by future research.

Type
Articles
Copyright
Copyright © Cambridge University Press 2013 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ackerman, M. S., Cranor, L. F., Reagle, J. 1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In EC'99: Proceedings of the 1st ACM Conference on Electronic Commerce, Feldman, S. & Wellman, M. (eds). ACM, 1–8.Google Scholar
Acquisti, A., Gritzalis, S., Lambrinoudakis, C., di Vimercati, S. (eds) 2008. Digital Privacy: Theory, Technologies, and Practices. Auerbach Publications.Google Scholar
Aïmeur, E., Brassard, G., Fernandez, J. M., Onana, F. S. M. 2006. Privacy-preserving demographic filtering. In Proceedings of the 2006 ACM Symposium on Applied computing, SAC '06, 872–878.Google Scholar
Alberola, J. M., Such, J. M., Garcia-Fornes, A., Espinosa, A., Botti, V. 2010. A performance evaluation of three multiagent platforms. Artificial Intelligence Review 34, 145176.Google Scholar
Balke, T., Eymann, T. 2008. The conclusion of contracts by software agents in the eyes of the law. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 771–778.Google Scholar
Barth, A., Datta, A., Mitchell, J. C., Nissenbaum, H. 2006. Privacy and contextual integrity: framework and applications. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE Computer Society, 184–198.Google Scholar
Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D. 2007. User centricity: a taxonomy and open issues. Journal of Computer Security 15, 493527.CrossRefGoogle Scholar
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E. 2009. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW '09, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 551–560.Google Scholar
Bishop, M. 2002. Computer Security: Art and Science. Addison-Wesley.Google Scholar
Boella, G., van der Torre, L., Verhagen, H. 2007. Introduction to normative multiagent systems. In Normative Multi-agent Systems, number 07122 in ‘Dagstuhl Seminar Proceedings, Boella, G., van der Torre, L. & Verhagen, H. (eds). Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI).Google Scholar
Borking, J., Van Eck, B., Siepel, P., Bedrijf, D. 1999. Intelligent Software agents: Turning a Privacy Threat into a Privacy Protector. Registratiekamer.Google Scholar
Bostwick, G. L. 1976. A taxonomy of privacy: repose sanctuary and intimate decisions. California Law Review 64(5), 14471483.Google Scholar
Brazier, F., Oskamp, A., Prins, C., Schellekens, M., Wijngaards, N. 2004. Anonymity and software agents: an interdisciplinary challenge. Artificial Intelligence and Law 12, 137157.Google Scholar
Brito, I., Meseguer, P. 2003. Distributed forward checking. Principles and Practice of Constraint Programming, Lecture Notes in Computer Science 2833, 801806.Google Scholar
Bygrave, L. 2001. Electronic agents and privacy: a cyberspace odyssey 2001. International Journal of Law and Information Technology 9(3), 275294.Google Scholar
Camp, L. J. 1996. Privacy & Reliability in Internet Commerce. PhD thesis, Department of Computer Science, Carnegie Mellon University.Google Scholar
Carrara, E., Hogben, G. 2007. Reputation-based systems: a security analysis, ENISA Position Paper.Google Scholar
Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 8490.Google Scholar
Chaum, D. 1985. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28, 10301044.CrossRefGoogle Scholar
Chen, B.-C., Kifer, D., LeFevre, K., Machanavajjhala, A. 2009. Privacy-preserving data publishing. Foundations and Trends in Databases 2(1–2), 1167.Google Scholar
Cheng, A., Friedman, E. (2005), Sybil proof reputation mechanisms. In Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECON '05, Friedman, E. & Sirer, E. G. (eds). ACM, 128–132.Google Scholar
Chopra, S., White, L. 2004. Artificial agents – personhood in law and philosophy. In Proceedings of the 13th European Conference on Artificial Intelligence (ECAI 2004), 635–639.Google Scholar
Chopra, S., White, L. 2007. Privacy and artificial agents, or, is google reading my email? In Proceedings of the 20th International Joint Conference on Artificial Intelligence, Sangal, R., Mehta, H. & Bagga, R. K. (eds). Morgan Kaufmann Publishers Inc., 1245–1250.Google Scholar
Cissèe, R. 2003. An architecture for agent-based privacy-preserving information filtering. In Proceedings of the Sixth International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems.Google Scholar
Cissèe, R., Albayrak, S. 2007. An agent-based approach for privacy-preserving recommender systems. In Proceedings of the 6th International JointCconference on Autonomous Agents and Multiagent Systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 182:1–182:8.Google Scholar
Clauβ , S., Kesdogan, D., Kölsch, T. 2005. Privacy enhancing identity management: protection against re-identification and profiling. In DIM '05: Proceedings of the 2005 Workshop on Digital Identity Management, Atluri, V., Samarati, P. & Goto, A. (eds). ACM, 84–93.Google Scholar
Crépin, L, Demazeau, Y., Boissier, O., Jacquenet, F. 2009. Sensitive data transaction in hippocratic multi-agent systems. In ‘Engineering Societies in the Agents World IX’, Artikis, A., Picard, G. & Vercouter, L. (eds). Springer-Verlag, 85101.Google Scholar
Crépin, L., Vercouter, L., Boissier, O., Demazeau, Y., Jacquenet, F. 2008. Hippocratic multi-agent systems. In Proceedings of the Tenth International Conference on Enterprise Information Systems ICEIS, 301–307.Google Scholar
Criado, N., Argente, E., Botti, V. 2011. Open issues for normative multi-agent systems. AI Communications 24(3), 233264.CrossRefGoogle Scholar
Criado, N., Argente, E., Julian, V., Botti, V. 2009. Designing virtual organizations. In Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS2009), volume 55 of Advances in Soft Computing, Salamanca, Spain, 440–449.Google Scholar
Cuenca Grau, B., Horrocks, I. 2008. Privacy-preserving query answering in logic-based information systems. In Proceedings of the 2008 Conference on ECAI 2008: 18th European Conference on Artificial Intelligence, Ghallab, M., Spyropoulos, C., Fakotakis, N. & Avouris, N. (eds). IOS Press, 40–44.Google Scholar
Diaz, C. 2006. Anonymity metrics revisited. In Anonymous Communication and its Applications, number 05411 in ‘Dagstuhl Seminar Proceedings, Dolev, S., Ostrovsky, R. & Pfitzmann, A. (eds). IBFI, 147–166.Google Scholar
Dierks, T., Allen, C. 1999. The tls protocol version 1.0, RFC 2246, http://www.ietf.org/rfc/rfc2246.txt [retrieved February 2011].Google Scholar
Dingledine, R., Mathewson, N., Syverson, P. 2004. Tor: the second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, 303–320.Google Scholar
Farkas, C., Jajodia, S. 2002. The inference problem: a survey. ACM SIGKDD Explorations Newsletter 4(2), 11.Google Scholar
Fasli, M. 2007a. Agent Technology for E-Commerce. John Wiley & Sons.Google Scholar
Fasli, M. 2007b. On agent technology for e-commerce: trust, security and legal issues. Knowledge Engineering Review 22(1), 335.Google Scholar
FIPA 1998. FIPA Agent Security Management, FIPA. http://www.fipa.org/specs/fipa00020/OC00020A.htmlGoogle Scholar
Fischer-Hübner, S., Hedbom, H. 2008. Benefits of privacy-enhancing identity management. Asia-Pacific Business Review 10(4), 3652.Google Scholar
Friedman, E. J., Resnick, P. 1998. The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10, 173199.Google Scholar
Frier, A., Karlton, P., Kocher, P. 1996. The secure socket layer. Technical Report MSU-CSE-00-2, Netscape Communications.Google Scholar
Gangopadhyay, A. (ed.) 2001. Managing Business with Electronic Commerce: Issues and Trends. IGI Publishing.Google Scholar
Garfinkel, S. 2001. Database Nation: The Death of Privacy in the 21st Century. O'Reilly & Associates, Inc.Google Scholar
Garfinkel, S. 2009. Privacy requires security, not abstinence: protecting an inalienable right in the age of facebook, http://www.technologyreview.com/computing/22831/Google Scholar
Gibbins, N., Harris, S., Shadbolt, N. 2004. Agent-based semantic web services. Web Semantics: Science, Services and Agents on the World Wide Web 1(2), 141154.Google Scholar
Goldschlag, D., Reed, M., Syverson, P. 1999. Onion routing for anonymous and private internet connections. Communications of the ACM 42, 3941.Google Scholar
Green, K., Derlega, V. J., Mathews, A. 2006. In The Cambridge Handbook of Personal Relationships. Cambridge University Press, chapter Self-Disclosure in Personal Relationships, 409–427.Google Scholar
Greenstadt, R., Grosz, B., Smith, M. D. 2007. Ssdpop: improving the privacy of dcop with secret sharing. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 171:1–171:3.Google Scholar
Greenstadt, R., Pearce, J. P., Tambe, M. 2006. Analysis of privacy loss in distributed constraint optimization. In Proceedings of the 21st National Conference on Artificial IntelligenceVolume 1, Cohn, A. (ed.). AAAI Press, 647–653.Google Scholar
Gross, R., Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Atluri, V., De Capitani di Vimercati, S. & Dingledine, R. (eds). ACM, 71–80.Google Scholar
Hansen, M., Berlich, P., Camenisch, J., Clau, S., Pfitzmann, A., Waidner, M. 2004. Privacy enhancing identity management. Information Security Technical Report 9(1), 3544.CrossRefGoogle Scholar
Hansen, M., Schwartz, A., Cooper, A. 2008. Privacy and identity management. IEEE Security & Privacy 6(2), 3845.Google Scholar
Head, M., Yuan, Y. 2001. Privacy protection in electronic commerce – a theoretical framework. Human Systems Management 20(2), 149160.Google Scholar
Hildebrandt, M., Gutwirth, S. 2008. Profiling the European Citizen: Cross-Disciplinary Perspectives. Springer Publishing Company, Inc..CrossRefGoogle Scholar
Hoffman, D., Novak, T., Peralta, M. 1999. Building consumer trust online. Communications of the ACM 42(4), 8085.Google Scholar
Hoffman, K., Zage, D., Nita-Rotaru, C. 2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42, 1:11:31.Google Scholar
Huberman, B. A., Adar, E., Fine, L. R. 2005. Valuating privacy. IEEE Security and Privacy 3(5), 2225.Google Scholar
Ismail, L. 2008. A secure mobile agents platform. Journal of Communications 3(2), 112.CrossRefGoogle Scholar
JADE Board 2005. Jade security guide, http://jade.tilab.comGoogle Scholar
Jaiswal, A., Kim, Y., Gini, M. L. 2004. Design and implementation of a secure multi-agent marketplace. Electronic Commerce Research and Applications 3(4), 355368.Google Scholar
Jennings, N., Faratin, P., Lomuscio, A., Parsons, S., Wooldridge, M., Sierra, C. 2001. Automated negotiation: prospects, methods and challenges. Group Decision and Negotiation 10(2), 199215.Google Scholar
Jøsang, A., Golbeck, J. 2009. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009).Google Scholar
Jøsang, A., Ismail, R., Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decision Support System 43(2), 618644.Google Scholar
Jøsang, A., Patton, M., Ho, A. 2001. Authentication for humans. In Proceedings of the 9th International Conference on; Telecommunication Systems (ICTS2001).Google Scholar
Kang, J. 1998. Information privacy in cyberspace transactions. Stanford Law Review 50(4), 11931294.Google Scholar
Kerr, R., Cohen, R. 2009. Smart cheaters do prosper: defeating trust and reputation systems. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 993–1000.Google Scholar
Koops, B. -J., Leenes, R. 2006. Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit – DuD 30, 553556.Google Scholar
Korba, L., Song, R., Yee, G. 2002. Anonymous communications for mobile agents. In Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications, MATA '02, 171–181.Google Scholar
Krause, A., Horvitz, E. 2008. A utility-theoretic approach to privacy and personalization. In AAAI'08: Proceedings of the 23rd National Conference on Artificial Intelligence, Cohn, A. (ed.). AAAI Press, 1181–1188.Google Scholar
Krupa, Y., Vercouter, L. 2010. Contextual integrity and privacy enforcing norms for virtual communities. In 11th International Workshop on Coordination, Organization, Institutions and Norms in Multi-Agent Systems (COIN@MALLOW2010), 150–165.Google Scholar
Lebanon, G., Scannapieco, M., Fouad, M. R., Bertino, E. 2006. Beyond k-anonymity: a decision theoretic framework for assessing privacy risk. In Privacy in Statistical Databases, 217–232.Google Scholar
Lee, H.-H., Stamp, M. 2008. An agent-based privacy-enhancing model. Information Management & Computer Security 16(3), 305319.Google Scholar
Leuf, B., Cunningham, W. 2001. The Wiki Way: Quick Collaboration on the Web. Addison-Wesley Longman Publishing Co., Inc.Google Scholar
Lilien, L., Bhargava, B. 2008. Privacy and trust in online interactions. In Online Consumer Protection: Theories of Human Relativism, Chen, K. & Fadlalla, A. (eds). Information Science Reference, 85–122.Google Scholar
Longstaff, T., Ellis, J., Shawn, H., Lipson, H., Mcmillan, R., Pesante, H. L., Simmel, D. 1997. Security of the internet. The Froehlich/Kent Encyclopedia of Telecommunications 15, 231255.Google Scholar
Luck, M., McBurney, P., Shehory, O., Willmott, S. 2005. Agent Technology: Computing as Interaction (A Roadmap for Agent Based Computing). AgentLink.Google Scholar
Maheswaran, R., Pearce, J., Bowring, E., Varakantham, P., Tambe, M. 2006. Privacy loss in distributed constraint reasoning: a quantitative framework for analysis and its applications. Autonomous Agents and Multi-Agent Systems 13, 2760.Google Scholar
Menczer, F., Street, W. N., Vishwakarma, N., Monge, A. E., Jakobsson, M. 2002. Intellishopper: a proactive, personal, private shopping assistant. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 3, AAMAS '02, 1001–1008.Google Scholar
Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S., Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C., Virdhagriswaran, S., White, J. 1998. Masif: The omg mobile agent system interoperability facility. Personal and Ubiquitous Computing 2, 117129. 10.1007/BF01324942. http://dx.doi.org/10.1007/BF01324942Google Scholar
Mitchell, T., Caruana, R., Freitag, D., McDermott, J., Zabowski, D. 1994. Experience with a learning personal assistant. Communications of the ACM 37(7), 8091.Google Scholar
Montaner, M., López, B., De La Rosa, J. 2003. A taxonomy of recommender agents on the internet. Artificial Intelligence Review 19(4), 285330.Google Scholar
Newman, A. E. 2004. Cougaar developers’ guide, http://www.cougaar.orgGoogle Scholar
Neuman, C., Yu, T., Hartman, S., Raeburn, K. 2005. The Kerberos Network Authentication Service (V5), number 4120 in ‘Request for Comments. IETF.Google Scholar
Nissenbaum, H. 2004. Privacy as contextual integrity. Washington Law Review 79(1).Google Scholar
Odlyzko, A. 2003. Privacy, economics, and price discrimination on the internet. In Proceedings of the 5th International Conference on Electronic Commerce, ICEC '03, Sadeh, N., Dively, M. J., Kauffman, M., Labrou, Y., Shehory, O., Telan, R. & Cranor, L. (eds). ACM, 355–366.Google Scholar
Olson, J. S., Grudin, J., Horvitz, E. 2005. A study of preferences for sharing and privacy. In CHI '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems, Van der Veer, G. & Gale, C. (eds). ACM, 1985–1988.Google Scholar
Palen, L., Dourish, P. 2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Ssystems, Cockton, G. & Korhonen, P. (eds). ACM, 129–136.Google Scholar
Petkovic, M., Jonker, W. (eds) 2007. Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications). Springer-Verlag.Google Scholar
Pfitzmann, A., Hansen, M. 2010. A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, http://dud.inf.tu-dresden.de/AnonTerminology.shtml. v0.34.Google Scholar
Piolle, G., Demazeau, Y., Caelen, J. 2007. Privacy management in user-centred multi-agent systems. In Engineering Societies in the Agents World VII, Lecture Notes in Computer Science 4457, 354–367. Springer.Google Scholar
Poslad, S., Calisti, M. 2000. Towards improved trust and security in FIPA agent platforms. In Workshop on Deception, Fraud and Trust in Agent Societies, Barcelona, Spain.Google Scholar
Poslad, S., Charlton, P., Calisti, M. 2003. Specifying standard security mechanisms in multi-agent systems. In Proceedings of the 2002 International Conference on Trust, Reputation, and Security: Theories and Practice, AAMAS'02. Springer-Verlag, 163–176. http://portal.acm.org/citation.cfm?id=1762128.1762141Google Scholar
Quillinan, T. B., Warnier, M., Oey, M., Timmer, R., Brazier, F. 2008. Enforcing security in the agent scape middleware. In Proceedings of the 2008 Workshop on Middleware Security, MidSec '08, Scandariato, R. & Russello, G. (eds). ACM, 25–30.Google Scholar
Ramchurn, S., Huynh, D., Jennings, N. 2004. Trust in multi-agent systems. The Knowledge Engineering Review 19(1), 125.Google Scholar
Rannenberg, K., Royer, D., Deuker, A. (eds) 2009. The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Incorporated.Google Scholar
Recursion Software Inc. 2008. Voyager security guide, http://www.recursionsw.com/Google Scholar
Roth, V., Jalali-Sohi, M. 2001. Concepts and architecture of a security-centric mobile agent server. In Proceedings of the International Symposium on Autonomous Decentralized System.Google Scholar
Sabater, J., Sierra, C. 2005. Review on computational trust and reputation models. Artificial Intelligence Review 24, 3360.Google Scholar
Schermer, B. 2007. Software Agents, Surveillance, and the Right to Privacy: A Legislative Framework for Agent-enabled surveillance. Amsterdam University Press.Google Scholar
Seigneur, J.-M., Jensen, C. D. 2004. Trading privacy for trust. In Trust Management. Springer, 93–107.Google Scholar
Senicar, V., Jerman-Blazic, B., Klobucar, T. 2003. Privacy-enhancing technologies–approaches and development. Computer Standards & Interfaces 25(2), 147158.Google Scholar
Shannon, C. E. 1948. A mathematical theory of communication. Bell System Technical Journal 27(3), 379–423.Google Scholar
Sierra, C. 2004. Agent-mediated electronic commerce. Autonomous Agents and Multi-Agent Systems 9(3), 285301.Google Scholar
Sierra, C., Botti, V., Ossowski, S. 2011. Agreement computing. KI-Künstliche Intelligenz 25(1), 57–61.Google Scholar
Sierra, C., Debenham, J. 2008. Information-based deliberation. In AAMAS '08: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, Padgham, L., Parkes, D. C., Müller, J. P. & Parsons, S. (eds). International Foundation for Autonomous Agents and Multiagent Systems, 689–696.Google Scholar
Silaghi, M. C., Mitra, D. 2004. Distributed constraint satisfaction and optimization with privacy enforcement. In Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT '04. IEEE Computer Society, 531–535.Google Scholar
Smith, H. J., Milberg, S. J. 1996. Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly 20, 167196.CrossRefGoogle Scholar
Solanas, A., Martìınez-ballesté, A. 2009. Advances in Artificial Intelligence for Privacy Protection and Security. World Scientific Publishing Co., Inc.Google Scholar
Solove, D. 2002. Conceptualizing privacy. California Law Review 90(4), 10871155.Google Scholar
Solove, D. 2006. A taxonomy of privacy. University of Pennsylvania Law Review 154(3), 477560.Google Scholar
Spiekermann, S. 2006. Individual price discriminaton – an impossibility?. In International Conference for HumanComputer Interaction (CHI'2006), Workshop on Privacy and Personalization’.Google Scholar
Spiekermann, S., Cranor, L. F. 2009. Engineering privacy. IEEE Transactions on Software Engineering 35(1), 6782.Google Scholar
Stallings, W. 2010. Network Security Essentials: Applications and Standards. Prentice Hall.Google Scholar
Stamp, M. 2006. Information Security: Principles and Practice. Wiley-Interscience.Google Scholar
Such, J. M. 2011. Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València.Google Scholar
Such, J. M., Alberola, J. M., Espinosa, A., Garcia-Fornes, A. 2011a. A group-oriented secure multiagent platform. Software: Practice and Experience 41(11), 12891302.Google Scholar
Such, J. M., Garcia-Fornes, A., Espinosa, A., Bellver, J. 2013. Magentix2: A privacy-enhancing Agent Platform. Engineering Applications of Artificial Intelligence 26(1), 96109.Google Scholar
Such, J. M., Espinosa, A., Garcia-Fornes, A., Botti, V. 2011b. Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence 24(7), 11281136.Google Scholar
Such, J. M., Espinosa, A., Garcia-Fornes, A., Sierra, C. 2011d. Privacy-intimacy tradeoff in selfdisclosure. In Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS2011). IFAAMAS, 1189–1190.Google Scholar
Such, J. M., Espinosa, A., Garcia-Fornes, A., Sierra, C. 2012a. Self-disclosure decision making based on intimacy and privacy. Information Sciences 211, 93111.Google Scholar
Such, J. M., Serrano, E., Botti, V., Garca-Fornes, A. 2012b. Strategic pseudonym change in agent-based E-commerce. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012), Valencia, Spain, 1377–1378.Google Scholar
Taylor, H. 2003. Most People Are “Privacy Pragmatists” Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits., Harris Interactive. Retrieved February 27, 2011, from http://www.harrisinteractive.com/vault/Harris-Interactive-Poll-Research-Most-People-Are-Privacy-Pragmatists-Who-While-Conc-2003-03.pdfGoogle Scholar
Tentori, M., Favela, J., Rodriguez, M. D. 2006. Privacy-aware autonomous agents for pervasive healthcare. IEEE Intelligent Systems 21, 5562.Google Scholar
Udupi, Y. B., Singh, M. P. 2010. Information sharing among autonomous agents in referral networks. In Agents and Peer-to-Peer Computing, Joseph, S. R., Despotovic, Z., Moro, G. & Bergamaschi, S. (eds). Springer-Verlag, 1326.Google Scholar
Ugurlu, S., Erdogan, N. 2005. An overview of secmap secure mobile agent platform. In Proceedings of Second International Workshop on Safety and Security in Multiagent Systems.Google Scholar
van Blarkom, G., Borking, J., Olk, J. (eds) 2003. Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents. College bescherming persoonsgegevens.Google Scholar
van Elst, L., Abecker, A., Dignum, V. 2004. Agent-mediated Knowledge Management: International Symposium Amkm 2003, Stanford, CA, USA, March 2426, 2003: Revised and Invited Papers, Lecture Notes in Computer Science 2926, 428. Springer-Verlag.Google Scholar
van Otterloo, S. 2005. The value of privacy: optimal strategies for privacy minded agents. In AAMAS '05: Proceedings of the Fourth International Joint conference on Autonomous Agents and Multiagent Systems, Pechoucek, M., Steiner, D. & Thompson, S. (eds). ACM, 1015–1022.Google Scholar
Wallace, R. J., Freuder, E. C. 2005. Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving. Artificial Intelligence 161, 209227.Google Scholar
Warnier, M., Brazier, F. 2010. Anonymity services for multi-agent systems. Web Intelligence and Agent Systems 8(2), 219232.Google Scholar
Warren, S., Brandeis, L. 1890. The right to privacy. Harvard Law Review 4(5), 193–220.Google Scholar
Weitnauer, E., Thomas, N., Rabe, F., Kopp, S. 2008. Intelligent agents living in social virtual environments bringing max into second life. In Intelligent Virtual Agents (IVA). Springer, 552553.Google Scholar
Westin, A. 1967. Privacy and Freedom. Atheneum.Google Scholar
Westin, A. 1984. The origins of modern claims to privacy. In Philosophical Dimensions of Privacy: An Anthology, Schoeman, F. D. (ed.). Cambridge University Press, 5674.Google Scholar
Wooldridge, M. 2002. An Introduction to MultiAgent Systems. Wiley.Google Scholar
Xu, H., Shatz, S. M. 2003. Adk: an agent development kit based on a formal design model for multi-agent systems. Journal of Automated Software Engineering 10, 337365.Google Scholar
Yao, M. Z., Rice, R. E., Wallis, K. 2007. Predicting user concerns about online privacy. J American Society for Information Science and Technology 58(5), 710722.Google Scholar
Yassine, A., Shirehjini, A. A. N., Shirmohammadi, S., Tran, T. T. 2010. An intelligent agent-based model for future personal information markets. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2, 457–460, Toronto, Canada.Google Scholar
Yassine, A., Shirmohammadi, S. 2009. Measuring users’ privacy payoff using intelligent agents. In Computational Intelligence for Measurement Systems and Applications, CIMSA '09, 169–174.Google Scholar
Yokoo, M., Suzuki, K., Hirayama, K. 2005. Secure distributed constraint satisfaction: reaching agreement without revealing private information. Artificial Intelligence 161, 229245.Google Scholar
Yu, H., Kaminsky, M., Gibbons, P. B., Flaxman, A. 2006. Sybilguard: defending against sybil attacks via social networks. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06, Rizzo, L., Anderson, T. & McKeown, N. (eds). ACM, 267–278. http://doi.acm.org/10.1145/1159913.1159945Google Scholar
Zheleva, E., Getoor, L. 2009. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW '09: Proceedings of the 18th International Conference on World Wide Web, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 531–540.Google Scholar
Zhu, Z., Wang, G., Du, W. 2009. Deriving private information from association rule mining results. In Proceedings of the 2009 IEEE International Conference on Data Engineering, Ioannidis, Y. E., Lee, D. L. & Ng, R. T. (eds). IEEE Computer Society, 18–29.Google Scholar