Skip to main content

An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications

  • Conference paper
Advanced Agent Technology (AAMAS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7068))

Included in the following conference series:

Abstract

Privacy is of crucial importance in order for agent-based e-commerce applications to be of broad use. Privacy can be enhanced minimizing data identifiability, i.e., the degree by which personal information can be directly attributed to a particular individual. However, minimizing data identifiability may directly impact other crucial issues in agent-based e-commerce, such as accountability, trust, and reputation. In this paper, we present an agent infrastructure for agent-based e-commerce applications. This agent infrastructure enhances privacy without compromising accountability, trust, and reputation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aïmeur, E., Brassard, G., Onana, F.S.M.: Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS International Conference on e-Commerce, pp. 25–33 (2005)

    Google Scholar 

  2. Alberola, J.M., Such, J.M., Garcia-Fornes, A., Espinosa, A., Botti, V.: A performance evaluation of three multiagent platforms. Artificial Intelligence Review 34, 145–176 (2010)

    Article  Google Scholar 

  3. Balke, T., Eymann, T.: The conclusion of contracts by software agents in the eyes of the law. In: Proc. of The 7th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2008), pp. 771–778 (2008)

    Google Scholar 

  4. Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: A taxonomy and open issues. J. Comput. Secur. 15, 493–527 (2007)

    Article  Google Scholar 

  5. Bordini, R.H., Wooldridge, M., Hübner, J.F.: Programming Multi-Agent Systems in AgentSpeak using Jason (Wiley Series in Agent Technology). John Wiley & Sons (2007)

    Google Scholar 

  6. Carrara, E., Hogben, G.: Reputation-based systems: a security analysis. ENISA Position Paper (2007)

    Google Scholar 

  7. Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  8. Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030–1044 (1985)

    Article  Google Scholar 

  9. Clauβ, S., Kesdogan, D., Kölsch, T.: Privacy enhancing identity management: protection against re-identification and profiling. In: DIM 2005: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 84–93. ACM, New York (2005)

    Google Scholar 

  10. Dierks, T., Allen, C.: The tls protocol version 1.0. RFC 2246 (1999), http://www.ietf.org/rfc/rfc2246.txt

  11. Fasli, M.: Agent Technology For E-Commerce. John Wiley & Sons (2007)

    Google Scholar 

  12. Fasli, M.: On agent technology for e-commerce: trust, security and legal issues. Knowledge Engineering Review 22(1), 3–35 (2007)

    Article  Google Scholar 

  13. FIPA: FIPA ACL Message Structure Specification. FIPA (2001), http://www.fipa.org/specs/fipa00061/

  14. Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10, 173–199 (1998)

    Article  Google Scholar 

  15. Frier, A., Karlton, P., Kocher, P.: The secure socket layer. Tech. Rep. MSU-CSE-00-2, Netscape Communications (1996)

    Google Scholar 

  16. Garfinkel, S.: Privacy requires security, not abstinence: Protecting an inalienable right in the age of facebook (2009), http://www.technologyreview.com/computing/22831/

  17. Hoffman, D., Novak, T., Peralta, M.: Building consumer trust online. Communications of the ACM 42(4), 80–85 (1999)

    Article  Google Scholar 

  18. JADE Board: Jade security guide (2005), http://jade.tilab.com

  19. Jøsang, A., Golbeck, J.: Challenges for Robust Trust and Reputation Systems. In: Proceedings of the 5th International Workshop on Security and Trust Management, STM 2009 (2009)

    Google Scholar 

  20. Kerr, R., Cohen, R.: Smart cheaters do prosper: defeating trust and reputation systems. In: Proc. of The 8th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009), pp. 993–1000 (2009)

    Google Scholar 

  21. Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). No. 4120 in Request for Comments, IETF (2005)

    Google Scholar 

  22. Newman, A.E.: Cougaar developers’ guide (2004), http://www.cougaar.org

  23. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34 (August 2010), http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

  24. Quillinan, T.B., Warnier, M., Oey, M., Timmer, R., Brazier, F.: Enforcing security in the agentscape middleware. In: Proceedings of the 2008 Workshop on Middleware Security, MidSec 2008, pp. 25–30. ACM (2008)

    Google Scholar 

  25. Ramchurn, S., Huynh, D., Jennings, N.: Trust in multi-agent systems. The Knowledge Engineering Review 19(1), 1–25 (2004)

    Article  Google Scholar 

  26. Rannenberg, K., Royer, D., Deuker, A. (eds.): The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Heidelberg (2009) Incorporated

    Google Scholar 

  27. Recursion Software Inc.: Voyager security guide (2008), http://www.recursionsw.com/

  28. Roth, V., Jalali-Sohi, M.: Concepts and architecture of a security-centric mobile agent server. In: ISADS (2001)

    Google Scholar 

  29. Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24, 33–60 (2005)

    Article  MATH  Google Scholar 

  30. Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering 35(1), 67–82 (2009)

    Article  Google Scholar 

  31. Stamp, M.: Information Security: Principles and Practice. Wiley-Interscience (2006)

    Google Scholar 

  32. Such, J.M., Alberola, J.M., Espinosa, A., Garcia-Fornes, A.: A group-oriented secure multiagent platform. Software: Practice and Experience (in Press, 2011a)

    Google Scholar 

  33. Such, J.M., Espinosa, A., Garcia-Fornes, A., Botti, V.: Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence (in Press, 2011b)

    Google Scholar 

  34. Ugurlu, S., Erdogan, N.: An overview of secmap secure mobile agent platform. In: Proceedings of Second International Workshop on Safety and Security in Multiagent Systems (2005)

    Google Scholar 

  35. Vinoski, S.: Advanced message queuing protocol. IEEE Internet Computing 10(6), 87–89 (2006)

    Article  Google Scholar 

  36. Warnier, M., Brazier, F.: Anonymity services for multi-agent systems. Web Intelligence and Agent Systems 8(2), 219–232 (2010)

    Google Scholar 

  37. Westin, A.: Social and political dimensions of privacy. Journal of Social Issues 59(2), 431–453 (2003)

    Article  Google Scholar 

  38. Xu, H., Shatz, S.M.: Adk: An agent development kit based on a formal design model for multi-agent systems. Journal of Automated Software Engineering 10, 337–365 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Such, J.M., Espinosa, A., Garcia-Fornes, A. (2012). An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications. In: Dechesne, F., Hattori, H., ter Mors, A., Such, J.M., Weyns, D., Dignum, F. (eds) Advanced Agent Technology. AAMAS 2011. Lecture Notes in Computer Science(), vol 7068. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27216-5_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27216-5_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27215-8

  • Online ISBN: 978-3-642-27216-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics