Privacy in distributed electronic commerce

In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act oh behalf of human users in electronic transactions. A challenge with this approach is that the agents would be entrusted with access to sensitive personal or business information. How can this sensitive information be protected from unauthorized access? How can agents negotiate across jurisdictional boundaries; both corporate, and country? The latter question is of particular concern when one considers the potential for considerable variance between the regulations and policies of different governments and corporations. This is especially evident with the disparity of legislation for privacy in different countries. How can disparate regulations be accommodated effectively? What technologies are appropriate for maintaining user privacy and for protecting sensitive information for agent-based e-commerce? In this paper, we describe the issues that provoke privacy challenges for agent-based e-commerce due to current and impending privacy legislation as well as an approach for policy-driven privacy negotiation for use in distributed agent-based systems.

[1]  Mark S. Fox,et al.  Coordinating multiple agents in the supply chain , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.

[2]  Shi Meilin,et al.  Application of agents in workflow management system , 1999, Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference on Communications,.

[3]  Alistair Kelman,et al.  Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..

[4]  Jeremy L. Jacob,et al.  Specifying security for CSCW systems , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[5]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[6]  Antonio Corradi,et al.  A secure and open mobile agent programming environment , 1999, Proceedings. Fourth International Symposium on Autonomous Decentralized Systems. - Integration of Heterogeneous Systems -.

[7]  Bruce A. Reinig,et al.  Managing user perceptions of email privacy , 1995, CACM.

[8]  Jae Kyu Lee,et al.  An Intelligent Agents–Based Virtually Defaultless Check System: The SafeCheck System , 1998, Int. J. Electron. Commer..

[9]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[10]  Jean-Henry Morin,et al.  Controlling the dissemination of electronic documents , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.

[11]  Pattie Maes,et al.  Agent-mediated electronic commerce: issues, challenges and some viewpoints , 1998, AGENTS '98.

[12]  Paulo Marques,et al.  Security mechanisms for using mobile agents in electronic commerce , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[13]  Pattie Maes,et al.  Agents that buy and sell , 1999, CACM.

[14]  Rolf Oppliger Privacy protection and anonymity services for the World Wide Web (WWW) , 2000, Future Gener. Comput. Syst..

[15]  Jae Kyu Lee,et al.  Intelligent agent based contract process in electronic commerce: UNIK-AGENT approach , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[16]  Henk Sol,et al.  Proceedings of the 54th Hawaii International Conference on System Sciences , 1997, HICSS 2015.

[17]  J. Dong,et al.  Software agents model in CSCW , 1997, 1997 IEEE International Conference on Intelligent Processing Systems (Cat. No.97TH8335).

[18]  Thomas Magedanz,et al.  Impacts of mobile agent technology on mobile communication system evolution , 1998, IEEE Wirel. Commun..

[19]  Gail E. Kaiser,et al.  Collaborative Work: Using Agents to Enable Collaborative Work , 1998, IEEE Internet Comput..

[20]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[21]  Bruce Schneier,et al.  Secure audit logs to support computer forensics , 1999, TSEC.

[22]  Lihui Wang,et al.  Reference architecture for internet-based intelligent shop floors , 2000 .