Skip to main content

Privacy Management in User-Centred Multi-agent Systems

  • Conference paper
Engineering Societies in the Agents World VII (ESAW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4457))

Included in the following conference series:

Abstract

In all user-centred agent-based applications, for instance in the context of ambient computing, the user agent is often faced to a difficult trade-off between the protection of its own privacy, and the fluidity offered by the services. In existing applications, the choice is almost never on the user’s side, even though the law grants him a number of rights in order to guarantee his privacy. We examine here different technical works that seem to be as many interesting ways of dealing with privacy policies. The problems already solved will be identified, as well as remaining technical challenges. Then we will propose directions of research based on the most interesting aspects of the underlined approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Article 29 Data Protection Working Party: Working Document on Trusted Computing Platforms and in particular on the work done by the Trusted Computing Group (TCG group), The European Commission (2004)

    Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. In: Proceedings of the Royal Society of London, Series A, London, UK, vol. 426, pp. 233–271 (1989)

    Google Scholar 

  3. Bygrave, L.A.: Electronic Agents and Privacy: A Cyberspace Odyssey. International Journal of Law and Information Technology 9(3), 275–294 (2001)

    Article  Google Scholar 

  4. Castelfranchi, C., Falcone, R.: Principles of Trust for Multi-Agent Systems: Cognitive Anatomy, Social Importance, and Quantification. In: ICMAS 1998. International Conference of Multi-Agent Systems, Paris, pp. 72–79 (1998)

    Google Scholar 

  5. Castelfranchi, C.: Trust Mediation in Knowledge Management and Sharing. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 304–318. Springer, Heidelberg (2004)

    Google Scholar 

  6. Cranor, L.F.: Electronic Voting: Computerized Polls May Save Money, Protect Privacy. In: Crossroads, vol. 2(4), pp. 12–16. ACM Press, New York (1996)

    Google Scholar 

  7. Finin, T., Fritzson, R., McKay, D., McEntire, R.: KQML as an Agent Communication Language. In: CIKM 1994. Proceedings of the Third International Conference on Information and Knowledge Management, Gaithersburg, MD, USA, pp. 456–463 (1994)

    Google Scholar 

  8. Huberman, B.A., Hogg, T.: Protecting Privacy While Revealing Data. Nature Biotech. 20, 332 (2002)

    Article  Google Scholar 

  9. Internet Engineering Task Force: IDSec: Virtual Identity on the Internet, http://idsec.sourceforge.net/

  10. Pearson, S.: Trusted Agents that Enhance User Privacy by Self-Profiling. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 113–121. Springer, Heidelberg (2003)

    Google Scholar 

  11. Pearson, S.: Trusted Computing Platforms: TCPA Technology in Context. Prenctice Hall PTR, Upper Saddle River, New Jersey, USA (2002)

    Google Scholar 

  12. Riché, S., Brebner, G.: Client-Side Profile Storage. In: Gregori, E., Cherkasova, L., Cugola, G., Panzieri, F., Picco, G.P. (eds.) NETWORKING 2002. LNCS, vol. 2376, pp. 127–133. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Riché, S., Brebner, G.: Storing and Accessing User Context. In: 4th International Conference on Mobile Data Management, Melbourne, Australia, pp. 1–12 (2003)

    Google Scholar 

  14. Subirana, B., Bain, M.: Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond. Springer, USA (2005)

    Google Scholar 

  15. The European Parliament and the Council: Directive 2002/58/EC of the European Parliament and of the Council of 12 july 2002 Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector. Official Journal of the European Communities (2002)

    Google Scholar 

  16. Trusted Computing Group (2006), https://www.trustedcomputinggroup.org/home

  17. Westin, A.: Privacy and Freedom. Atheneum, New York, USA (1967)

    Google Scholar 

  18. World Wide Web Consortium: Platform for Privacy Preferences Specification 1.0, http://www.w3.org/P3P/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gregory M. P. O’Hare Alessandro Ricci Michael J. O’Grady Oğuz Dikenelli

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Piolle, G., Demazeau, Y., Caelen, J. (2007). Privacy Management in User-Centred Multi-agent Systems. In: O’Hare, G.M.P., Ricci, A., O’Grady, M.J., Dikenelli, O. (eds) Engineering Societies in the Agents World VII. ESAW 2006. Lecture Notes in Computer Science(), vol 4457. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75524-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75524-1_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75522-7

  • Online ISBN: 978-3-540-75524-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics