Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
CRYPTO '88 Proceedings on Advances in cryptology
Building consumer trust online
Communications of the ACM
Data mining: practical machine learning tools and techniques with Java implementations
Data mining: practical machine learning tools and techniques with Java implementations
What makes Internet users visit cyber stores again? key design factors for customer loyalty
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Database nation: the death of privacy in the 21st century
Database nation: the death of privacy in the 21st century
IntelliShopper: a proactive, personal, private shopping assistant
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3
Anonymous Communications for Mobile Agents
MATA '02 Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications
A Framework for Argumentation-Based Negotiation
ATAL '97 Proceedings of the 4th International Workshop on Intelligent Agents IV, Agent Theories, Architectures, and Languages
Concepts and Architecture of a Security-Centric Mobile Agent Server
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
ADK: An Agent Development Kit Based on a Formal Design Model for Multi-Agent Systems
Automated Software Engineering
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Learning opponents' preferences in multi-object automated negotiation
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
Agent Technology For E-Commerce
Agent Technology For E-Commerce
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Profiling the European Citizen: Cross-Disciplinary Perspectives
Profiling the European Citizen: Cross-Disciplinary Perspectives
Privacy and Identity Management
IEEE Security and Privacy
Opponent modelling in automated multi-issue negotiation using Bayesian learning
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 1
Enforcing security in the AgentScape middleware
Proceedings of the 2008 workshop on Middleware security
IEEE Transactions on Software Engineering
Preference Ordering in Agenda Based Multi-issue Negotiation for Service Level Agreement
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
The Future of Identity in the Information Society: Challenges and Opportunities
The Future of Identity in the Information Society: Challenges and Opportunities
A utility-theoretic approach to privacy and personalization
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Debugging complex software systems by means of pathfinder networks
Information Sciences: an International Journal
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Partial identities as a foundation for trust and reputation
Engineering Applications of Artificial Intelligence
A group-oriented secure multiagent platform
Software—Practice & Experience
Learning opponent's preferences for effective negotiation: an approach based on concept learning
Autonomous Agents and Multi-Agent Systems
An approach to debug interactions in multi-agent system software tests
Information Sciences: an International Journal
Simultaneous optimization of artificial neural networks for financial forecasting
Applied Intelligence
Ontology-based user profile learning
Applied Intelligence
A qualitative reputation system for multiagent systems with protocol-based communication
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Data mining agent conversations: A qualitative approach to multiagent systems analysis
Information Sciences: an International Journal
Mining interesting user behavior patterns in mobile commerce environments
Applied Intelligence
Hi-index | 0.00 |
Agent-based electronic commerce is known to offer many advantages to users. However, very few studies have been devoted to deal with privacy issues in this domain. Privacy is of great concern and preserving users' privacy plays a crucial role to promote their trust in agent-based technologies. In this paper, we focus on preference profiling, which is a well-known threat to users' privacy. Specifically, we review strategies for customers' agents to prevent seller agents from obtaining accurate preference profiles of the former group by using data mining techniques. We experimentally show the efficacy of each of these strategies and discuss their suitability in different situations. Our experimental results show that customers can improve their privacy notably with these strategies.