A survey of privacy in multi-agent systems
暂无分享,去创建一个
[1] Vicent J. Botti,et al. Strategic pseudonym change in agent-based e-commerce , 2012, AAMAS.
[2] B. Buunk,et al. The Cambridge handbook of personal relationships , 2006 .
[3] Olivier Boissier,et al. Hippocratic Multi-Agent Systems , 2008, ICEIS.
[4] Ian Horrocks,et al. Privacy-Preserving Query Answering in Logic-based Information Systems , 2008, ECAI.
[5] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[6] A. Gangopadhyay. Managing business with electronic commerce : issues and trends , 2001 .
[7] Pedro Meseguer,et al. Distributed Forward Checking , 2003, CP.
[8] Markus Jakobsson,et al. IntelliShopper: a proactive, personal, private shopping assistant , 2002, AAMAS '02.
[9] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[10] Nicholas R. Jennings,et al. On Agent-Mediated Electronic Commerce , 2003, IEEE Trans. Knowl. Data Eng..
[11] Laurent Vercouter,et al. Contextual Integrity and Privacy Enforcing Norms for Virtual Communities , 2010, MALLOW.
[12] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[13] Sahin Albayrak,et al. An agent-based approach for privacy-preserving recommender systems , 2007, AAMAS '07.
[14] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[15] Lise Getoor,et al. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.
[16] Jose M. Such,et al. An agent infrastructure for privacy-enhancing agent-based e-commerce applications , 2011, AAMAS'11.
[17] Jose M. Such,et al. Self-disclosure decision making based on intimacy and privacy , 2012, Inf. Sci..
[18] Samir Chopra,et al. Artificial Agents - Personhood in Law and Philosophy , 2004, ECAI.
[19] Claudia Díaz. Anonymity Metrics Revisited , 2005, Anonymous Communication and its Applications.
[20] Sarvapali D. Ramchurn,et al. Trust in multi-agent systems , 2004, The Knowledge Engineering Review.
[21] Olivier Boissier,et al. Sensitive Data Transaction in Hippocratic Multi-Agent Systems , 2008, ESAW.
[22] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[23] Vicent J. Botti,et al. Partial identities as a foundation for trust and reputation , 2011, Eng. Appl. Artif. Intell..
[24] Gilles Brassard,et al. Privacy-preserving demographic filtering , 2006, SAC.
[25] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[26] Anita L. Vangelisti,et al. The Cambridge Handbook of Personal Relationships: RELATIONAL QUALITIES , 2006 .
[27] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[28] V. Derlega,et al. The Cambridge Handbook of Personal Relationships: Self-Disclosure in Personal Relationships , 2006 .
[29] Michael A. Menlowe,et al. Philosophical Dimensions of Privacy: An Anthology , 2009 .
[30] Guido Boella,et al. Introduction to normative multiagent systems , 2006, Comput. Math. Organ. Theory.
[31] Jonathan Grudin,et al. A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.
[32] Nadia Erdogan,et al. SECMAP: A Secure Mobile Agent Platform , 2005, CEEMAS.
[33] B Busby. Security on the Internet. , 1997, Health physics.
[34] Jose M. Such,et al. A group‐oriented secure multiagent platform , 2011, Softw. Pract. Exp..
[35] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[36] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[37] Ronald E. Rice,et al. Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..
[38] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[39] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[40] Yves Demazeau,et al. Privacy Management in User-Centred Multi-agent Systems , 2006, ESAW.
[41] J. Borges,et al. A TAXONOMY OF PRIVACY , 2006 .
[42] Linda Jean Camp. Privacy & reliability in internet commerce , 1996 .
[43] Nadia Erdogan,et al. An Overview of SECMAP Secure Mobile Agent Platform , 2005 .
[44] Abdulsalam Yassine,et al. Measuring users' privacy payoff using intelligent agents , 2009, 2009 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications.
[45] Bharat Bhargava,et al. Privacy and Trust in Online Interactions , 2008 .
[46] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[47] A. Acquisti,et al. Digital privacy : theory, technologies, and practices , 2007 .
[48] Eytan Adar,et al. Valuating Privacy , 2005, WEIS.
[49] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[50] Bart Willem Schermer,et al. Software Agents, Surveillance and the right to privacy , 2007 .
[51] Kai Rannenberg,et al. The Future of Identity in the Information Society , 2009, The Future of Identity in the Information Society.
[52] Benjamin C. M. Fung,et al. Privacy-preserving data publishing , 2007 .
[53] Michael Luck,et al. Agent technology, Computing as Interaction: A Roadmap for Agent Based Computing , 2005 .
[54] Hans Hedbom,et al. Benefits of Privacy-Enhancing Identity Management , 2008 .
[55] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[56] Haiping Xu,et al. ADK: An Agent Development Kit Based on a Formal Design Model for Multi-Agent Systems , 2003, Automated Software Engineering.
[57] Agusti Solanas,et al. Advances in Artificial Intelligence for Privacy Protection and Security , 2009 .
[58] Barbara Messing,et al. An Introduction to MultiAgent Systems , 2002, Künstliche Intell..
[59] Marit Hansen,et al. Privacy and Identity Management , 2008, IEEE Security & Privacy.
[60] Maria L. Gini,et al. Design and implementation of a secure multi-agent marketplace , 2004, Electron. Commer. Res. Appl..
[61] Natalia Criado,et al. Open issues for normative multi-agent systems , 2011, AI Commun..
[62] Ernesto Damiani,et al. XML-based access control languages , 2004, Inf. Secur. Tech. Rep..
[63] Milind Tambe,et al. Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.
[64] Makoto Yokoo,et al. Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..
[65] Sieuwert van Otterloo,et al. The value of privacy: optimal strategies for privacy minded agents , 2005, AAMAS '05.
[66] Milan Petkovic,et al. Security, Privacy, and Trust in Modern Data Management , 2007, Data-Centric Systems and Applications.
[67] Jerry Kang. Information Privacy in Cyberspace Transactions , 1998 .
[68] Benjamin Gerber,et al. Conceptualizing privacy , 2010, CSOC.
[69] Stefan Poslad,et al. Towards improved trust and security in FIPA agent platforms , 2004 .
[70] Alistair Kelman,et al. Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..
[71] E. Argente,et al. Designing Virtual Organizations , 2009, PAAMS.
[72] Wenliang Du,et al. Deriving Private Information from Association Rule Mining Results , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[73] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[74] Josep Lluís de la Rosa i Esteva,et al. A Taxonomy of Recommender Agents on the Internet , 2003, Artificial Intelligence Review.
[75] Stefan Poslad,et al. Specifying Standard Security Mechanisms in Multi-agent Systems , 2002, Trust, Reputation, and Security.
[76] Frances M. T. Brazier,et al. Anonymity services for multi-agent systems , 2010, Web Intell. Agent Syst..
[77] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[78] Torsten Eymann,et al. The conclusion of contracts by software agents in the eyes of the law , 2008, AAMAS.
[79] Volker Roth,et al. Concepts and architecture of a security-centric mobile agent server , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.
[80] Andreas Abecker,et al. Agent-Mediated Knowledge Management , 2004, Lecture Notes in Computer Science.
[81] Nigel Shadbolt,et al. Agent-based semantic web services , 2003, WWW '03.
[82] Jessika Daecher. The Future Of Identity In The Information Society Challenges And Opportunities , 2016 .
[83] Andreas Abecker,et al. Agent-mediated knowledge management : International Symposium AMKM 2003, Stanford, CA, USA, March 24-26, 2003 : revised and invited papers , 2004 .
[84] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[85] Munindar P. Singh,et al. Information Sharing among Autonomous Agents in Referral Networks , 2007, AP2PC.
[86] Eugene C. Freuder,et al. Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving , 2005, Artif. Intell..
[87] Serge Gutwirth,et al. Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .
[88] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[89] Adlen Ksentini. IPv6 over IEEE 802.16 (WiMAX) Networks: Facts and Challenges , 2008, J. Commun..
[90] Maria Fasli,et al. On agent technology for e-commerce: trust, security and legal issues , 2007, The Knowledge Engineering Review.
[91] Michael D. Smith,et al. SSDPOP: improving the privacy of DCOP with secret sharing , 2007, AAMAS '07.
[92] Tomaz Klobucar,et al. Privacy-Enhancing Technologies - approaches and development , 2003, Comput. Stand. Interfaces.
[93] Bert-Jaap Koops,et al. Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.
[94] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[95] Richard Cissée DAI-Labor. An Architecture for Agent-Based Privacy-Preserving Information Filtering , 2003 .
[96] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[97] Dogan Kesdogan,et al. Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.
[98] Mittal S. Bhiogade. Secure Socket Layer , 2001 .
[99] Carles Sierra,et al. Information-based deliberation , 2008, AAMAS.
[100] Josef Kittler,et al. Privacy in Statistical Databases , 2012, Lecture Notes in Computer Science.
[101] Alan Westin. Philosophical Dimensions of Privacy: The origins of modern claims to privacy , 1984 .
[102] Milan Petkovic,et al. Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications) , 2007 .
[103] J. Rubenfeld. The Right of Privacy , 1989 .
[104] Michael Wooldridge,et al. An introduction to multiagent systems Wiley , 2002 .
[105] Lee A. Bygrave,et al. Electronic Agents and Privacy: A Cyberspace Odyssey 2001 , 2001, Int. J. Law Inf. Technol..
[106] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[107] Chuleeporn Changchit. Online Consumer Protection: Theories of Human Relativism , 2009 .
[108] Robin Cohen,et al. Smart cheaters do prosper: defeating trust and reputation systems , 2009, AAMAS.
[109] Frances M. T. Brazier,et al. Anonymity and software agents: An interdisciplinary challenge , 2004, Artificial Intelligence and Law.
[110] Tom M. Mitchell,et al. Experience with a learning personal assistant , 1994, CACM.
[111] Frances M. T. Brazier,et al. Enforcing security in the AgentScape middleware , 2008, MidSec '08.
[112] Marius-Calin Silaghi,et al. Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..
[113] Samir Chopra,et al. Privacy and Artificial Agents, or, Is Google Reading My Email? , 2007, IJCAI.
[114] Mark Stamp,et al. An agent-based privacy-enhancing model , 2008, Inf. Manag. Comput. Secur..
[115] Andrew M. Odlyzko,et al. Privacy, economics, and price discrimination on the Internet , 2003, ICEC '03.
[116] Gerrit C. van der Veer,et al. CHI '05 Extended Abstracts on Human Factors in Computing Systems , 2005, CHI 2005.
[117] Michael Wooldridge,et al. Autonomous agents and multi-agent systems , 2014 .
[118] Abdulsalam Yassine,et al. An Intelligent Agent-Based Model for Future Personal Information Markets , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[119] Christian Damsgaard Jensen,et al. Trading Privacy for Trust , 2004, iTrust.
[120] Stefan Kopp,et al. Intelligent Agents Living in Social Virtual Environments - Bringing Max into Second Life , 2008, IVA.
[121] Maria Fasli,et al. Agent Technology For E-Commerce , 2007 .
[122] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[123] Jose M. Such,et al. Magentix2: A privacy-enhancing Agent Platform , 2013, Eng. Appl. Artif. Intell..
[124] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[125] Audun Jøsang,et al. Authentication for Humans , 2001 .
[126] M. Struik,et al. Intelligent Software Agents : Turning a Privacy Threat into a Privacy Protector , 1999 .
[127] Elisa Bertino,et al. Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk , 2009, Trans. Data Priv..
[128] Milind Tambe,et al. Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.
[129] Reputation-based Systems: a security analysis , 2007 .
[130] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[131] A. Jøsang,et al. Challenges for Robust Trust and Reputation Systems , 2009 .
[132] Marcela D. Rodríguez,et al. Privacy-Aware Autonomous Agents for Pervasive Healthcare , 2006, IEEE Intelligent Systems.
[133] Jose M. Such,et al. Enhancing privacy in Multi-agent Systems , 2012, AI Commun..
[134] Andreas Krause,et al. A Utility-Theoretic Approach to Privacy and Personalization , 2008, AAAI.
[135] Jose M. Such,et al. Privacy-intimacy tradeoff in self-disclosure , 2011, AAMAS.
[136] Vicent J. Botti,et al. A performance evaluation of three multiagent platforms , 2010, Artificial Intelligence Review.
[137] Ronggong Song,et al. Anonymous Communications for Mobile Agents , 2002, MATA.
[138] Sushil Jajodia,et al. The inference problem: a survey , 2002, SKDD.
[139] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[140] Mark Stamp,et al. Information security - principles and practice , 2005 .
[141] Gary L. Bostwick. A Taxonomy of Privacy: Repose, Sanctuary, and Intimate Decision , 1976 .
[142] Dejan S. Milojicic,et al. MASIF: The OMG mobile agent system interoperability facility , 1998, Personal Technologies.
[143] Yufei Yuan,et al. Privacy protection in electronic commerce - a theoretical framework , 2001 .
[144] Rajeev Rastogi,et al. SPARTAN: using constrained models for guaranteed-error semantic compression , 2002, SKDD.
[145] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[146] Leila Ismail. A Secure Mobile Agents Platform , 2008, J. Commun..
[147] Bo Leuf,et al. The Wiki Way: Quick Collaboration on the Web , 2001 .
[148] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[149] N. R. Jennings,et al. To appear in: Int Journal of Group Decision and Negotiation GDN2000 Keynote Paper Automated Negotiation: Prospects, Methods and Challenges , 2022 .
[150] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[151] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[152] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[153] Abhilasha Bhargav-Spantzel,et al. User centricity: a taxonomy and open issues , 2006, DIM '06.