-
1
-
-
70350357233
-
-
Auerbach Publications
-
Acquisti, A.; Gritzalis, S.; Lambrinoudakis, C.; di Vimercati, S. (Eds.), 2008. Digital Privacy: Theory, Technologies, and Practices. Auerbach Publications.
-
(2008)
Digital Privacy: Theory, Technologies, and Practices
-
-
Acquisti, A.1
Gritzalis, S.2
Lambrinoudakis, C.3
Di Vimercati, S.4
-
3
-
-
77956903712
-
A performance evaluation of three multiagent platforms
-
J.M. Alberola, J.M. Such, A. Garcia-Fornes, A. Espinosa, and V. Botti A performance evaluation of three multiagent platforms Artif. Intell. Rev. 34 2010 145 176
-
(2010)
Artif. Intell. Rev.
, vol.34
, pp. 145-176
-
-
Alberola, J.M.1
Such, J.M.2
Garcia-Fornes, A.3
Espinosa, A.4
Botti, V.5
-
4
-
-
84855322597
-
Learning opponents preferences for effective negotiation: An approach based on concept learning
-
Aydoan, R.; Yolum, P.; 2010. Learning opponents preferences for effective negotiation: an approach based on concept learning. Auton. Agents Multi-Agent Syst.; 1-37. URL 〈 http://dx.doi.org/10.1007/s10458-010-9147-0 〉.
-
(2010)
Auton. Agents Multi-Agent Syst.
, pp. 1-37
-
-
Aydoan, R.1
Yolum, P.2
-
7
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
ACM, New York, NY, USA
-
Bilge, L.; Strufe, T.; Balzarotti, D.; Kirda, E.; 2009. All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference on World Wide Web (WWW). ACM, New York, NY, USA, pp. 551-560.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web (WWW)
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
11
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum Security without identification: transaction systems to make big brother obsolete Commun. ACM 28 1985 1030 1044
-
(1985)
Commun. ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
12
-
-
84929273746
-
Untraceable electronic cash
-
Springer-Verlag New York, Inc.; New York, NY, USA
-
Chaum, D.; Fiat, A.; Naor, M.; 1990. Untraceable electronic cash. In: Proceedings on Advances in Cryptology(CRYPTO). Springer-Verlag New York, Inc.; New York, NY, USA, pp. 319-327.
-
(1990)
Proceedings on Advances in Cryptology(CRYPTO)
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
13
-
-
29244445484
-
Sybilproof reputation mechanisms
-
ACM, New York, NY, USA
-
Cheng, A.; Friedman, E.; 2005. Sybilproof reputation mechanisms. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECON '05. ACM, New York, NY, USA, 2005, pp. 128-132. http://dx.doi.org.10.1145/1080192.1080202.
-
(2005)
Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECon '05
, pp. 128-132
-
-
Cheng, A.1
Friedman, E.2
-
15
-
-
77953549584
-
Privacy enhancing identity management: Protection against re-identification and profiling
-
ACM, New York, NY, USA
-
Clauß, S.; Kesdogan, D.; Kölsch, T.; 2005. Privacy enhancing identity management: protection against re-identification and profiling. In: Proceedings of the Workshop on Digital identity management (DIM). ACM, New York, NY, USA, pp. 84-93.
-
(2005)
Proceedings of the Workshop on Digital Identity Management (DIM)
, pp. 84-93
-
-
Clauß, S.1
Kesdogan, D.2
Kölsch, T.3
-
17
-
-
34249739074
-
On agent technology for e-commerce: Trust, security and legal issues
-
M. Fasli On agent technology for e-commerce: trust, security and legal issues Knowl. Eng. Rev. 22 1 2007 3 35
-
(2007)
Knowl. Eng. Rev.
, vol.22
, Issue.1
, pp. 3-35
-
-
Fasli, M.1
-
20
-
-
78751526925
-
Benefits of privacy-enhancing identity management
-
S. Fischer-Hübner, and H. Hedbom Benefits of privacy-enhancing identity management Asia-Pac. Bus. Rev. 10 4 2008 36 52
-
(2008)
Asia-Pac. Bus. Rev.
, vol.10
, Issue.4
, pp. 36-52
-
-
Fischer-Hübner, S.1
Hedbom, H.2
-
24
-
-
1642281602
-
Privacy-enhancing identity management
-
M. Hansen, P. Berlich, J. Camenisch, S. Clau, A. Pfitzmann, and M. Waidner Privacy-enhancing identity management Inf. Secur. Tech. Rep. 9 1 2004 35 44
-
(2004)
Inf. Secur. Tech. Rep.
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clau, S.4
Pfitzmann, A.5
Waidner, M.6
-
27
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
K. Hoffman, D. Zage, and C. Nita-Rotaru A survey of attack and defense techniques for reputation systems ACM Comput. Surv. 42 2009 1:1 1:31 http://dx.doi.org.10.1145/1592451.1592452
-
(2009)
ACM Comput. Surv.
, vol.42
, pp. 11-131
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
29
-
-
33646594936
-
-
JADE Board
-
JADE Board, 2005. Jade security guide, 〈 http://jade.tilab.com 〉.
-
(2005)
Jade Security Guide
-
-
-
31
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd A survey of trust and reputation systems for online service provision Decis. Support Syst. 43 2 2007 618 644
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
32
-
-
61449195430
-
Identity theft, identity fraud and/or identity-related crime
-
B.-J. Koops, and R. Leenes Identity theft, identity fraud and/or identity-related crime Datenschutz und Datensicherheit - DuD 30 2006 553 556
-
(2006)
Datenschutz und Datensicherheit - DuD
, vol.30
, pp. 553-556
-
-
Koops, B.-J.1
Leenes, R.2
-
34
-
-
49249110565
-
An agent-based privacy-enhancing model
-
H.-H. Lee, and M. Stamp An agent-based privacy-enhancing model Inf. Manage. Comput. Secur. 16 3 2008 305 319
-
(2008)
Inf. Manage. Comput. Secur.
, vol.16
, Issue.3
, pp. 305-319
-
-
Lee, H.-H.1
Stamp, M.2
-
36
-
-
0028477939
-
Experience with a learning personal assistant
-
T. Mitchell, R. Caruana, D. Freitag, J. McDermott, and D. Zabowski Experience with a learning personal assistant Commun. ACM 37 7 1994 80 91
-
(1994)
Commun. ACM
, vol.37
, Issue.7
, pp. 80-91
-
-
Mitchell, T.1
Caruana, R.2
Freitag, D.3
McDermott, J.4
Zabowski, D.5
-
37
-
-
0344519548
-
A taxonomy of recommender agents on the internet
-
M. Montaner, B. López, and J. De La Rosa A taxonomy of recommender agents on the internet Artif. Intell. Rev. 19 4 2003 285 330
-
(2003)
Artif. Intell. Rev.
, vol.19
, Issue.4
, pp. 285-330
-
-
Montaner, M.1
López, B.2
De La Rosa, J.3
-
38
-
-
0003899818
-
-
IETF
-
Neuman, C.; Yu, T.; Hartman, S.; Raeburn, K.; 2005. The Kerberos Network Authentication Service (V5), no. 4120 in Request for Comments, IETF.
-
(2005)
The Kerberos Network Authentication Service (V5), No. 4120 in Request for Comments
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
40
-
-
1142268161
-
Privacy, economics, and price discrimination on the internet
-
ACM, New York, NY, USA
-
Odlyzko, A.; 2003. Privacy, economics, and price discrimination on the internet. In: Proceedings of the Fifth International Conference on Electronic Commerce (ICEC). ACM, New York, NY, USA, pp. 355-366.
-
(2003)
Proceedings of the Fifth International Conference on Electronic Commerce (ICEC)
, pp. 355-366
-
-
Odlyzko, A.1
-
42
-
-
78649989557
-
-
(Aug. 2010)
-
Pfitzmann, A.; Hansen, M.; 2010. A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 〈 http://dud.inf.tu-dresden.de/Anon-Terminology.shtml 〉 (Aug. 2010).
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
43
-
-
84878107220
-
Computational trust and reputation models for open multi-agent systems: A review
-
doi:10.1007/s10462-011-9277-z
-
Pinyol, I.; Sabater-Mir, J.; 2011. Computational trust and reputation models for open multi-agent systems: a review. Artif. Intell. Rev. http://dx.doi.org/10.1007/s10462-011-9277-z.
-
(2011)
Artif. Intell. Rev.
-
-
Pinyol, I.1
Sabater-Mir, J.2
-
44
-
-
38349039899
-
Privacy management in user-centred multi-agent systems
-
G. O'Hare, A. Ricci, M. O'Grady, O. Dikenelli, Springer Berlin, Heidelberg
-
G. Piolle, Y. Demazeau, and J. Caelen Privacy management in user-centred multi-agent systems G. O'Hare, A. Ricci, M. O'Grady, O. Dikenelli, Engineering Societies in the Agents World VII, LNCS vol. 4457 2007 Springer Berlin, Heidelberg 354 367
-
(2007)
Engineering Societies in the Agents World VII, LNCS
, vol.4457
, pp. 354-367
-
-
Piolle, G.1
Demazeau, Y.2
Caelen, J.3
-
45
-
-
80053016826
-
Enforcing security in the AgentScape middleware
-
ACM, New York, NY, USA
-
Quillinan, T.B.; Warnier, M.; Oey, M.; Timmer, R.; Brazier, F.; 2008. Enforcing security in the AgentScape middleware. In: Proceedings of the Workshop on Middleware security (MidSec). ACM, New York, NY, USA, pp. 25-30.
-
(2008)
Proceedings of the Workshop on Middleware Security (MidSec)
, pp. 25-30
-
-
Quillinan, T.B.1
Warnier, M.2
Oey, M.3
Timmer, R.4
Brazier, F.5
-
47
-
-
80052831765
-
-
Recursion Software Inc.
-
Recursion Software Inc.; 2008. Voyager security guide, 〈 http://www.recursionsw.com/ 〉.
-
(2008)
Voyager Security Guide
-
-
-
48
-
-
84964039818
-
Concepts and architecture of a security-centric mobile agent server
-
IEEE Computer Society, Washington, DC, USA
-
Roth, V.; Jalali-Sohi, M.; 2001. Concepts and architecture of a security-centric mobile agent server. In: Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems (ISADS). IEEE Computer Society, Washington, DC, USA, pp. 435-444.
-
(2001)
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems (ISADS)
, pp. 435-444
-
-
Roth, V.1
Jalali-Sohi, M.2
-
49
-
-
85006210403
-
Review on computational trust and reputation models
-
J. Sabater, and C. Sierra Review on computational trust and reputation models Artif. Intell. Rev. 24 2005 33 60
-
(2005)
Artif. Intell. Rev.
, vol.24
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
52
-
-
4344686730
-
Agent-mediated electronic commerce
-
C. Sierra Agent-mediated electronic commerce Auton. Agents Multi-Agent Syst. 9 3 2004 285 301
-
(2004)
Auton. Agents Multi-Agent Syst.
, vol.9
, Issue.3
, pp. 285-301
-
-
Sierra, C.1
-
53
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
H.J. Smith, and S.J. Milberg Information privacy: measuring individuals' concerns about organizational practices MIS Q. 20 1996 167 196
-
(1996)
MIS Q.
, vol.20
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
-
54
-
-
33644925852
-
A taxonomy of privacy
-
D. Solove A taxonomy of privacy Univ. Penn. Law Rev. 154 3 2006 477 560
-
(2006)
Univ. Penn. Law Rev.
, vol.154
, Issue.3
, pp. 477-560
-
-
Solove, D.1
-
59
-
-
80052264832
-
Partial identities as a foundation for trust and reputation
-
J.M. Such, A. Espinosa, A. Garcia-Fornes, and V. Botti Partial identities as a foundation for trust and reputation Eng. Appl. Artif. Intell. 24 7 2011 1128 1136
-
(2011)
Eng. Appl. Artif. Intell.
, vol.24
, Issue.7
, pp. 1128-1136
-
-
Such, J.M.1
Espinosa, A.2
Garcia-Fornes, A.3
Botti, V.4
-
60
-
-
80052866365
-
A group-oriented secure multiagent platform
-
J.M. Such, J.M. Alberola, A. Espinosa, and A. Garcia-Fornes A group-oriented secure multiagent platform Softw. Pract. Exper. 41 11 2011 1289 1302
-
(2011)
Softw. Pract. Exper.
, vol.41
, Issue.11
, pp. 1289-1302
-
-
Such, J.M.1
Alberola, J.M.2
Espinosa, A.3
Garcia-Fornes, A.4
-
62
-
-
84862836602
-
Self-disclosure decision making based on intimacy and privacy
-
Such, J.M.; Espinosa, A.; Garcia-Fornes, A.; Sierra, C.; 2012. Self-disclosure decision making based on intimacy and privacy. Inf. Sci. vol. 211, pp. 93-111.
-
(2012)
Inf. Sci.
, vol.211
, pp. 93-111
-
-
Such, J.M.1
Espinosa, A.2
Garcia-Fornes, A.3
Sierra, C.4
-
63
-
-
24344484622
-
Most People Are Privacy Pragmatists Who, while Concerned about Privacy, Will Sometimes Trade It off for Other Benefits
-
Taylor, H.; 2003. Most People Are Privacy Pragmatists Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits. Harris Interactive.
-
(2003)
Harris Interactive
-
-
Taylor, H.1
-
65
-
-
71049161795
-
Computing confidence values: Does trust dynamics matter?
-
Springer-Verlag, 2009
-
Urbano, J.; Rocha, A.P.; Oliveira, E.; 2009. Computing confidence values: does trust dynamics matter? In: EPIA '09: Proceedings of the 14th Portuguese Conference on Artificial Intelligence. Springer-Verlag, 2009, pp. 520-531.
-
(2009)
EPIA '09: Proceedings of the 14th Portuguese Conference on Artificial Intelligence
, pp. 520-531
-
-
Urbano, J.1
Rocha, A.P.2
Oliveira, E.3
-
66
-
-
33751354607
-
Advanced message queuing protocol
-
S. Vinoski Advanced message queuing protocol IEEE Internet Comput. 10 6 2006 87 89 http://doi.ieeecomputersociety.org/10.1109/MIC.2006.116
-
(2006)
IEEE Internet Comput.
, vol.10
, Issue.6
, pp. 87-89
-
-
Vinoski, S.1
-
67
-
-
77649111174
-
Anonymity services for multi-agent systems
-
M. Warnier, and F. Brazier Anonymity services for multi-agent systems Web Intell. Agent Syst. 8 2 2010 219 232
-
(2010)
Web Intell. Agent Syst.
, vol.8
, Issue.2
, pp. 219-232
-
-
Warnier, M.1
Brazier, F.2
-
69
-
-
52149114700
-
Intelligent agents living in social virtual environments bringing max into second life
-
Springer, Berlin, Heidelberg
-
Weitnauer, E.; Thomas, N.; Rabe, F.; Kopp, S.; 2008. Intelligent agents living in social virtual environments bringing max into second life. In: Intelligent Virtual Agents (IVA). Springer, Berlin, Heidelberg, pp. 552-553.
-
(2008)
Intelligent Virtual Agents (IVA)
, pp. 552-553
-
-
Weitnauer, E.1
Thomas, N.2
Rabe, F.3
Kopp, S.4
-
72
-
-
0242334211
-
Adk: An agent development kit based on a formal design model for multi-agent systems
-
H. Xu, and S.M. Shatz Adk: an agent development kit based on a formal design model for multi-agent systems J. Automated Softw. Eng. 10 2003 337 365
-
(2003)
J. Automated Softw. Eng.
, vol.10
, pp. 337-365
-
-
Xu, H.1
Shatz, S.M.2
-
73
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
ACM, New York, NY, USA
-
Yu, H.; Kaminsky, M.; Gibbons, P.B.; Flaxman, A.; 2006. Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). ACM, New York, NY, USA, pp. 267-278.
-
(2006)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|