Communications of the ACM - Special issue on graphical user interfaces
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Designing trust into online experiences
Communications of the ACM
Trust and deception in virtual societies
Trust and deception in virtual societies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Distributed Trust in Open Multi-agent Systems
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Privacy in Distributed Electronic Commerce
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 9 - Volume 9
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Using Multivariate Statistics (5th Edition)
Using Multivariate Statistics (5th Edition)
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Non-violative user profiling approach for website design improvement
CSCWD'04 Proceedings of the 8th international conference on Computer Supported Cooperative Work in Design I
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
Persistent and dynamic trust: analysis and the related impact of trusted platforms
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
Privacy infringements when companies gather customer information are more likely to occur if the customer lacks control over this process. In this paper, a method is described for user self-profiling when engaged in e-commerce over the Internet, by which customers can have greater control over profiles relating to their behaviour or preferences and can exploit this information in a flexible way without revealing their identity. This is achieved using trusted agents that exploit Trusted Computing Platform technology [28].