Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Anonymous Communications for Mobile Agents
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
Principles of Trust for MAS: Cognitive Anatomy, Social Importance, and Quantification
ICMAS '98 Proceedings of the 3rd International Conference on Multi Agent Systems
On Agent-Mediated Electronic Commerce
IEEE Transactions on Knowledge and Data Engineering
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
An information-based model for trust
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
An integrated trust and reputation model for open multi-agent systems
Autonomous Agents and Multi-Agent Systems
Anonymity and software agents: an interdisciplinary challenge
Artificial Intelligence and Law
A survey of trust and reputation systems for online service provision
Decision Support Systems
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On agent technology for e-commerce: trust, security and legal issues
The Knowledge Engineering Review
The conclusion of contracts by software agents in the eyes of the law
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2
Trust Modeling with Context Representation and Generalized Identities
CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
Smart cheaters do prosper: defeating trust and reputation systems
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
The Future of Identity in the Information Society: Challenges and Opportunities
The Future of Identity in the Information Society: Challenges and Opportunities
Computing Confidence Values: Does Trust Dynamics Matter?
EPIA '09 Proceedings of the 14th Portuguese Conference on Artificial Intelligence: Progress in Artificial Intelligence
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Infrastructures and tools for multiagent systems for the new generation of distributed systems
Engineering Applications of Artificial Intelligence
Privacy and self-disclosure in multiagent systems
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
An agent infrastructure for privacy-enhancing agent-based e-commerce applications
AAMAS'11 Proceedings of the 10th international conference on Advanced Agent Technology
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market
ACM SIGSOFT Software Engineering Notes
Strategic pseudonym change in agent-based e-commerce
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Studying the impact of negotiation environments on negotiation teams' performance
Information Sciences: an International Journal
MaNEA: A distributed architecture for enforcing norms in open MAS
Engineering Applications of Artificial Intelligence
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Tasks for agent-based negotiation teams: Analysis, review, and challenges
Engineering Applications of Artificial Intelligence
Automated buyer profiling control based on human privacy attitudes
Electronic Commerce Research and Applications
Strategies for avoiding preference profiling in agent-based e-commerce environments
Applied Intelligence
Trust models and applications in communication and multi-agent systems
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers of KES2012-Part 2 of 2
Enhancing privacy in Multi-agent Systems
AI Communications
Hi-index | 0.00 |
This paper explores the relationships between the hard security concepts of identity and privacy on the one hand, and the soft security concepts of trust and reputation on the other hand. We specifically focus on two vulnerabilities that current trust and reputation systems have: the change of identity and multiple identities problems. As a result, we provide a privacy preserving solution to these vulnerabilities which integrates the explored relationships among identity, privacy, trust and reputation. We also provide a prototype of our solution to these vulnerabilities and an application scenario.