Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
CRYPTO '88 Proceedings on Advances in cryptology
Experience with a learning personal assistant
Communications of the ACM
Building consumer trust online
Communications of the ACM
A Taxonomy of Recommender Agents on theInternet
Artificial Intelligence Review
Concepts and Architecture of a Security-Centric Mobile Agent Server
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
ADK: An Agent Development Kit Based on a Formal Design Model for Multi-Agent Systems
Automated Software Engineering
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
Sybilproof reputation mechanisms
Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
An integrated trust and reputation model for open multi-agent systems
Autonomous Agents and Multi-Agent Systems
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Advanced Message Queuing Protocol
IEEE Internet Computing
Information Security: Principles and Practice
Information Security: Principles and Practice
Digital Privacy
Agent Technology For E-Commerce
Agent Technology For E-Commerce
A survey of trust and reputation systems for online service provision
Decision Support Systems
On agent technology for e-commerce: trust, security and legal issues
The Knowledge Engineering Review
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
User centricity: A taxonomy and open issues
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
Profiling the European Citizen: Cross-Disciplinary Perspectives
Profiling the European Citizen: Cross-Disciplinary Perspectives
The conclusion of contracts by software agents in the eyes of the law
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2
Intelligent Agents Living in Social Virtual Environments --- Bringing Max into Second Life
IVA '08 Proceedings of the 8th international conference on Intelligent Virtual Agents
Enforcing security in the AgentScape middleware
Proceedings of the 2008 workshop on Middleware security
IEEE Transactions on Software Engineering
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
The Future of Identity in the Information Society: Challenges and Opportunities
The Future of Identity in the Information Society: Challenges and Opportunities
A utility-theoretic approach to privacy and personalization
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Computing Confidence Values: Does Trust Dynamics Matter?
EPIA '09 Proceedings of the 14th Portuguese Conference on Artificial Intelligence: Progress in Artificial Intelligence
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Privacy management in user-centred multi-agent systems
ESAW'06 Proceedings of the 7th international conference on Engineering societies in the agents world VII
A performance evaluation of three multiagent platforms
Artificial Intelligence Review
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Partial identities as a foundation for trust and reputation
Engineering Applications of Artificial Intelligence
Mining qualitative context models from multiagent interactions
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
A group-oriented secure multiagent platform
Software—Practice & Experience
SECMAP: a secure mobile agent platform
CEEMAS'05 Proceedings of the 4th international Central and Eastern European conference on Multi-Agent Systems and Applications
Learning opponent's preferences for effective negotiation: an approach based on concept learning
Autonomous Agents and Multi-Agent Systems
Self-disclosure decision making based on intimacy and privacy
Information Sciences: an International Journal
Automated buyer profiling control based on human privacy attitudes
Electronic Commerce Research and Applications
Strategies for avoiding preference profiling in agent-based e-commerce environments
Applied Intelligence
Hi-index | 0.00 |
Agent Platforms are the software that supports the development and execution of Multi-agent Systems. There are many Agent Platforms developed by the agent community, but they hardly consider privacy. This leads to agent-based applications that invade users' privacy. Privacy can be threatened by two main information activities: information collection and information processing. Information collection can be prevented using traditional security mechanisms. Information processing can be prevented by minimizing data identifiability, i.e., the degree by which personal information can be directly attributed to a particular individual. However, minimizing data identifiability may directly affect other crucial issues in Multi-agent Systems, such as accountability, trust, and reputation. In this paper, we present the support that the Magentix2 Agent Platform provides for preserving privacy. Specifically, it provides mechanisms to avoid information collection and information processing when they are not desired. Moreover, Magentix2 provides these mechanisms without compromising accountability, trust, and reputation. We also provide in this paper an application built on top of Magentix2 that exploits its support for preserving privacy. Finally, we provide an extensive evaluation of the support that Magentix2 provides for preserving privacy based on that application. We specifically test whether or not privacy loss can be minimized by using the support that Magentix2 provides, whether or not this support introduces a bearable performance overhead, and whether or not existing trust and reputation models can be implemented on top of Magentix2.