Abstract
Privacy is of crucial importance in order for agent-based e-commerce applications to be of broad use. Privacy can be enhanced minimizing data identifiability, i.e., the degree by which personal information can be directly attributed to a particular individual. However, minimizing data identifiability may directly impact other crucial issues in agent-based e-commerce, such as accountability, trust, and reputation. In this paper, we present an agent infrastructure for agent-based e-commerce applications. This agent infrastructure enhances privacy without compromising accountability, trust, and reputation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aïmeur, E., Brassard, G., Onana, F.S.M.: Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS International Conference on e-Commerce, pp. 25–33 (2005)
Alberola, J.M., Such, J.M., Garcia-Fornes, A., Espinosa, A., Botti, V.: A performance evaluation of three multiagent platforms. Artificial Intelligence Review 34, 145–176 (2010)
Balke, T., Eymann, T.: The conclusion of contracts by software agents in the eyes of the law. In: Proc. of The 7th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2008), pp. 771–778 (2008)
Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: A taxonomy and open issues. J. Comput. Secur. 15, 493–527 (2007)
Bordini, R.H., Wooldridge, M., Hübner, J.F.: Programming Multi-Agent Systems in AgentSpeak using Jason (Wiley Series in Agent Technology). John Wiley & Sons (2007)
Carrara, E., Hogben, G.: Reputation-based systems: a security analysis. ENISA Position Paper (2007)
Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030–1044 (1985)
Clauβ, S., Kesdogan, D., Kölsch, T.: Privacy enhancing identity management: protection against re-identification and profiling. In: DIM 2005: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 84–93. ACM, New York (2005)
Dierks, T., Allen, C.: The tls protocol version 1.0. RFC 2246 (1999), http://www.ietf.org/rfc/rfc2246.txt
Fasli, M.: Agent Technology For E-Commerce. John Wiley & Sons (2007)
Fasli, M.: On agent technology for e-commerce: trust, security and legal issues. Knowledge Engineering Review 22(1), 3–35 (2007)
FIPA: FIPA ACL Message Structure Specification. FIPA (2001), http://www.fipa.org/specs/fipa00061/
Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10, 173–199 (1998)
Frier, A., Karlton, P., Kocher, P.: The secure socket layer. Tech. Rep. MSU-CSE-00-2, Netscape Communications (1996)
Garfinkel, S.: Privacy requires security, not abstinence: Protecting an inalienable right in the age of facebook (2009), http://www.technologyreview.com/computing/22831/
Hoffman, D., Novak, T., Peralta, M.: Building consumer trust online. Communications of the ACM 42(4), 80–85 (1999)
JADE Board: Jade security guide (2005), http://jade.tilab.com
Jøsang, A., Golbeck, J.: Challenges for Robust Trust and Reputation Systems. In: Proceedings of the 5th International Workshop on Security and Trust Management, STM 2009 (2009)
Kerr, R., Cohen, R.: Smart cheaters do prosper: defeating trust and reputation systems. In: Proc. of The 8th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009), pp. 993–1000 (2009)
Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). No. 4120 in Request for Comments, IETF (2005)
Newman, A.E.: Cougaar developers’ guide (2004), http://www.cougaar.org
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34 (August 2010), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
Quillinan, T.B., Warnier, M., Oey, M., Timmer, R., Brazier, F.: Enforcing security in the agentscape middleware. In: Proceedings of the 2008 Workshop on Middleware Security, MidSec 2008, pp. 25–30. ACM (2008)
Ramchurn, S., Huynh, D., Jennings, N.: Trust in multi-agent systems. The Knowledge Engineering Review 19(1), 1–25 (2004)
Rannenberg, K., Royer, D., Deuker, A. (eds.): The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Heidelberg (2009) Incorporated
Recursion Software Inc.: Voyager security guide (2008), http://www.recursionsw.com/
Roth, V., Jalali-Sohi, M.: Concepts and architecture of a security-centric mobile agent server. In: ISADS (2001)
Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24, 33–60 (2005)
Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering 35(1), 67–82 (2009)
Stamp, M.: Information Security: Principles and Practice. Wiley-Interscience (2006)
Such, J.M., Alberola, J.M., Espinosa, A., Garcia-Fornes, A.: A group-oriented secure multiagent platform. Software: Practice and Experience (in Press, 2011a)
Such, J.M., Espinosa, A., Garcia-Fornes, A., Botti, V.: Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence (in Press, 2011b)
Ugurlu, S., Erdogan, N.: An overview of secmap secure mobile agent platform. In: Proceedings of Second International Workshop on Safety and Security in Multiagent Systems (2005)
Vinoski, S.: Advanced message queuing protocol. IEEE Internet Computing 10(6), 87–89 (2006)
Warnier, M., Brazier, F.: Anonymity services for multi-agent systems. Web Intelligence and Agent Systems 8(2), 219–232 (2010)
Westin, A.: Social and political dimensions of privacy. Journal of Social Issues 59(2), 431–453 (2003)
Xu, H., Shatz, S.M.: Adk: An agent development kit based on a formal design model for multi-agent systems. Journal of Automated Software Engineering 10, 337–365 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Such, J.M., Espinosa, A., Garcia-Fornes, A. (2012). An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications. In: Dechesne, F., Hattori, H., ter Mors, A., Such, J.M., Weyns, D., Dignum, F. (eds) Advanced Agent Technology. AAMAS 2011. Lecture Notes in Computer Science(), vol 7068. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27216-5_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-27216-5_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27215-8
Online ISBN: 978-3-642-27216-5
eBook Packages: Computer ScienceComputer Science (R0)