Consumer privacy concerns about Internet marketing
Communications of the ACM
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Internet privacy concerns confirm the case for intervention
Communications of the ACM
Building consumer trust online
Communications of the ACM
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
Privacy-preserving global customization
Proceedings of the 2nd ACM conference on Electronic commerce
Journal of Computer Security - Special issue on security in the World Wide Web
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Targeted Advertising ... And Privacy Too
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Privacy Protection for Transactions of Digital Goods
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System
Information Systems Frontiers
A trusted method for self-profiling in e-commerce
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Hi-index | 0.00 |
Web technologies provide several means to infringe user privacy. This is especially true when customers buying tangible goods submit orders that contain their real identity and physical address. Then, in practice, the vendor can link this information with all information gathered about the customer, obtained through various means. In this paper, we present a solution that is based on mobile agents and a newinfrastructure consisting of a mobile agent base station and a cardinality observer. This infrastructure can be used to prevent the vendor from directly linking information gathered about the customer with identifying information usually contained in the customer's order. The vendor can only assign customers to their correct profiles with some probability which depends on the number of candidate profiles. The new infrastructure allows the customer to decrease this probability in several ways. The usage of both the cardinality observer and the mobile agent base station deterministically guarantees to the customer that an agent only starts its journey when a desired threshold for the linking probability has been reached. In a second variant using only the mobile agent base station, the linking probability is decreased in a probabilistic manner by introducing a fixed delay before mobile agent release.