메뉴 건너뛰기




Volumn 29, Issue 3, 2014, Pages 314-344

A survey of privacy in multi-agent systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTONOMOUS AGENTS; COMPUTER APPLICATIONS; INFORMATION TECHNOLOGY; MULTI AGENT SYSTEMS; SURVEYS;

EID: 84900031982     PISSN: 02698889     EISSN: 14698005     Source Type: Journal    
DOI: 10.1017/S0269888913000180     Document Type: Review
Times cited : (51)

References (143)
  • 8
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • WWW '09, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds ACM
    • Bilge, L., Strufe, T., Balzarotti, D. & Kirda, E. 2009. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW '09, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 551-560
    • (2009) Proceedings of the 18th International Conference on World Wide Web , pp. 551-560
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 10
    • 85174589130 scopus 로고    scopus 로고
    • Introduction to normative multiagent systems
    • Boella, G., van Der Torre, L. & Verhagen, H. (eds). Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI
    • Boella, G., van Der Torre, L. & Verhagen, H. 2007. Introduction to normative multiagent systems. In Normative Multi-Agent Systems, number 07122 in 'Dagstuhl Seminar Proceedings, Boella, G., van Der Torre, L. & Verhagen, H. (eds). Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI
    • (2007) Normative Multi-Agent Systems number 07122 in 'Dagstuhl Seminar Proceedings
    • Boella, G.1    Van Der Torre, L.2    Verhagen, H.3
  • 12
    • 0005034890 scopus 로고
    • A taxonomy of privacy: Repose sanctuary and intimate decisions
    • Bostwick, G. L. 1976. A taxonomy of privacy: Repose sanctuary and intimate decisions. California Law Review 64(5), 1447-1483
    • (1976) California Law Review , vol.64 , Issue.5 , pp. 1447-1483
    • Bostwick, G.L.1
  • 16
    • 6144234717 scopus 로고    scopus 로고
    • PhD thesis Department of Computer Science, Carnegie Mellon University
    • Camp, L. J. 1996. Privacy & Reliability in Internet Commerce. PhD thesis, Department of Computer Science, Carnegie Mellon University
    • (1996) Privacy & Reliability in Internet Commerce
    • Camp, L.J.1
  • 18
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 84-90
    • (1981) Communications of the ACM , vol.24 , pp. 84-90
    • Chaum, D.1
  • 19
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • Chaum, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28, 1030-1044
    • (1985) Communications of the ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 23
    • 77954728083 scopus 로고    scopus 로고
    • Privacy and artificial agents, or, is google reading my email?
    • Sangal, R., Mehta, H. & Bagga, R. K. (eds Morgan Kaufmann Publishers Inc
    • Chopra, S. & White, L. 2007. Privacy and artificial agents, or, is google reading my email? In Proceedings of the 20th International Joint Conference on Artificial Intelligence, Sangal, R., Mehta, H. & Bagga, R. K. (eds). Morgan Kaufmann Publishers Inc., 1245-1250
    • (2007) Proceedings of the 20th International Joint Conference on Artificial Intelligence , pp. 1245-1250
    • Chopra, S.1    White, L.2
  • 24
    • 84868890692 scopus 로고    scopus 로고
    • An architecture for agent-based privacy-preserving information filtering
    • Privacy, Deception and Fraud in Agent Systems
    • Cissèe, R. 2003. An architecture for agent-based privacy-preserving information filtering. In Proceedings of the Sixth International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems
    • (2003) Proceedings of the Sixth International Workshop on Trust
    • Cissèe, R.1
  • 26
    • 77953549584 scopus 로고    scopus 로고
    • Privacy enhancing identity management: Protection against re-identification and profiling
    • Atluri, V., Samarati, P. & Goto, A. (eds ACM
    • Claub, S., Kesdogan, D. & Kölsch, T. 2005. Privacy enhancing identity management: Protection against re-identification and profiling. In DIM '05: Proceedings of the 2005 Workshop on Digital Identity Management, Atluri, V., Samarati, P. & Goto, A. (eds). ACM, 84-93
    • (2005) DIM ' 05: Proceedings of the 2005 Workshop on Digital Identity Management , pp. 84-93
    • Claub, S.1    Kesdogan, D.2    Kölsch, T.3
  • 27
    • 70349330796 scopus 로고    scopus 로고
    • Sensitive data transaction in hippocratic multiagent systems
    • Artikis, A., Picard, G. & Vercouter, L. (eds . Springer-Verlag
    • Crépin, L, Demazeau, Y., Boissier, O. & Jacquenet, F. 2009. Sensitive data transaction in hippocratic multiagent systems. In 'Engineering Societies in the Agents World IX', Artikis, A., Picard, G. & Vercouter, L. (eds). Springer-Verlag, 85-101
    • (2009) 'Engineering Societies in the Agents World IX , pp. 85-101
    • Crépin, L.1    Demazeau, Y.2    Boissier, O.3    Jacquenet, F.4
  • 29
    • 80955126793 scopus 로고    scopus 로고
    • Open issues for normative multi-Agent systems
    • Criado, N., Argente, E. & Botti, V. 2011. Open issues for normative multi-Agent systems. AI Communications 24(3), 233-264
    • (2011) AI Communications , vol.24 , Issue.3 , pp. 233-264
    • Criado, N.1    Argente, E.2    Botti, V.3
  • 37
    • 34249739074 scopus 로고    scopus 로고
    • On agent technology for e-commerce: Trust, security and legal issues
    • Fasli, M. 2007b. On agent technology for e-commerce: Trust, security and legal issues. Knowledge Engineering Review 22(1), 3-35
    • (2007) Knowledge Engineering Review , vol.22 , Issue.1 , pp. 3-35
    • Fasli, M.1
  • 38
    • 84900004783 scopus 로고    scopus 로고
    • FIPA FIPA
    • FIPA 1998. FIPA Agent Security Management, FIPA. http://www.fipa.org/ specs/fipa00020/ OC00020A.html
    • (1998) FIPA Agent Security Management
  • 39
  • 46
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Goldschlag, D., Reed, M. & Syverson, P. 1999. Onion routing for anonymous and private internet connections. Communications of the ACM 42, 39-41
    • (1999) Communications of the ACM , vol.42 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 50
    • 33749016498 scopus 로고    scopus 로고
    • Information revelation and privacy in online social networks
    • Atluri, V., De Capitani di Vimercati, S. & Dingledine, R. (eds). ACM
    • Gross, R. & Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Atluri, V., De Capitani di Vimercati, S. & Dingledine, R. (eds). ACM, 71-80
    • (2005) Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society , pp. 71-80
    • Gross, R.1    Acquisti, A.2
  • 53
    • 0034861231 scopus 로고    scopus 로고
    • Privacy protection in electronic commerce-A theoretical framework
    • Head, M. & Yuan, Y. 2001. Privacy protection in electronic commerce-A theoretical framework. Human Systems Management 20(2), 149-160
    • (2001) Human Systems Management , vol.20 , Issue.2 , pp. 149-160
    • Head, M.1    Yuan, Y.2
  • 56
    • 71649094416 scopus 로고    scopus 로고
    • A survey of attack and defense techniques for reputation systems
    • 31
    • Hoffman, K., Zage, D. & Nita-Rotaru, C. 2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42, 1:1-1:31
    • (2009) ACM Computing Surveys , vol.42 , Issue.1 , pp. 1-1
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 58
    • 77956183594 scopus 로고    scopus 로고
    • A secure mobile agents platform
    • Ismail, L. 2008. A secure mobile agents platform. Journal of Communications 3(2), 1-12
    • (2008) Journal of Communications , vol.3 , Issue.2 , pp. 1-12
    • Ismail, L.1
  • 59
    • 33646594936 scopus 로고    scopus 로고
    • JADE Board
    • JADE Board 2005. Jade security guide, http://jade.tilab.com
    • (2005) Jade security guide
  • 63
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Jøsang, A., Ismail, R. & Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decision Support System 43(2), 618-644
    • (2007) Decision Support System , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 65
    • 0347989497 scopus 로고    scopus 로고
    • Information privacy in cyberspace transactions
    • Kang, J. 1998. Information privacy in cyberspace transactions. Stanford Law Review 50(4), 1193-1294
    • (1998) Stanford Law Review , vol.50 , Issue.4 , pp. 1193-1294
    • Kang, J.1
  • 67
    • 61449195430 scopus 로고    scopus 로고
    • Identity theft, identity fraud and/or identity-related crime
    • Koops, B.-J. & Leenes, R. 2006. Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit-DuD 30, 553-556
    • (2006) Datenschutz und Datensicherheit-DuD , vol.30 , pp. 553-556
    • Koops, B.-J.1    Leenes, R.2
  • 70
    • 84884806715 scopus 로고    scopus 로고
    • Contextual integrity and privacy enforcing norms for virtual communities
    • Organization, Institutions and Norms in Multi-Agent Systems (COIN@MALLOW2010
    • Krupa, Y. & Vercouter, L. 2010. Contextual integrity and privacy enforcing norms for virtual communities. In 11th International Workshop on Coordination, Organization, Institutions and Norms in Multi-Agent Systems (COIN@MALLOW2010), 150-165
    • (2010) 11th International Workshop on Coordination , pp. 150-165
    • Krupa, Y.1    Vercouter, L.2
  • 74
    • 84900037566 scopus 로고    scopus 로고
    • Privacy and trust in online interactions
    • Chen, K. & Fadlalla, A. (eds). Information Science Reference
    • Lilien, L. & Bhargava, B. 2008. Privacy and trust in online interactions. In Online Consumer Protection: Theories of Human Relativism, Chen, K. & Fadlalla, A. (eds). Information Science Reference, 85-122
    • (2008) Online Consumer Protection: Theories of Human Relativism , pp. 85-122
    • Lilien, L.1    Bhargava, B.2
  • 84
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum, H. 2004. Privacy as contextual integrity. Washington Law Review 79(1
    • (2004) Washington Law Review , vol.79 , pp. 1
    • Nissenbaum, H.1
  • 85
    • 1142268161 scopus 로고    scopus 로고
    • Privacy, economics, and price discrimination on the internet
    • ICEC '03, Sadeh, N., Dively M. J., Kauffman, M., Labrou, Y., Shehory, O., Telan, R. & Cranor, L. (eds ACM
    • Odlyzko, A. 2003. Privacy, economics, and price discrimination on the internet. In Proceedings of the 5th International Conference on Electronic Commerce, ICEC '03, Sadeh, N., Dively, M. J., Kauffman, M., Labrou, Y., Shehory, O., Telan, R. & Cranor, L. (eds). ACM, 355-366
    • (2003) Proceedings of the 5th International Conference on Electronic Commerce , pp. 355-366
    • Odlyzko, A.1
  • 96
    • 80052831765 scopus 로고    scopus 로고
    • Recursion Software Inc
    • Recursion Software Inc. 2008. Voyager security guide http://www. recursionsw.com/
    • (2008) Voyager security guide
  • 98
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • Sabater, J. & Sierra, C. 2005. Review on computational trust and reputation models. Artificial Intelligence Review 24, 33-60
    • (2005) Artificial Intelligence Review , vol.24 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 102
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C. E. 1948. A mathematical theory of communication. Bell System Technical Journal 27(3), 379-423
    • (1948) Bell System Technical Journal , vol.27 , Issue.3 , pp. 379-423
    • Shannon, C.E.1
  • 107
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: Measuring individuals' concerns about organizational practices
    • Smith, H. J. & Milberg, S. J. 1996. Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly 20, 167-196
    • (1996) MIS Quarterly , vol.20 , pp. 167-196
    • Smith, H.J.1    Milberg, S.J.2
  • 109
    • 0036045758 scopus 로고    scopus 로고
    • Conceptualizing privacy
    • Solove, D. 2002. Conceptualizing privacy. California Law Review 90(4), 1087-1155
    • (2002) California Law Review , vol.90 , Issue.4 , pp. 1087-1155
    • Solove, D.1
  • 115
    • 84867541094 scopus 로고    scopus 로고
    • PhD thesis, Departament De Sistemes Informàtics i Computació, Universitat Politècnica De València
    • Such, J. M. 2011. Enhancing Privacy in Multi-Agent Systems. PhD thesis, Departament De Sistemes Informàtics i Computació, Universitat Politècnica De València
    • (2011) Enhancing Privacy in Multi-Agent Systems
    • Such, J.M.1
  • 123
  • 124
    • 76249097437 scopus 로고    scopus 로고
    • Information sharing among autonomous agents in referral networks
    • Joseph, S. R., Despotovic, Z., Moro, G. & Bergamaschi, S. (eds). Springer-Verlag
    • Udupi, Y. B. & Singh, M. P. 2010. Information sharing among autonomous agents in referral networks. In Agents and Peer-To-Peer Computing, Joseph, S. R., Despotovic, Z., Moro, G. & Bergamaschi, S. (eds). Springer-Verlag, 13-26
    • (2010) Agents and Peer-To-Peer Computing , pp. 13-26
    • Udupi, Y.B.1    Singh, M.P.2
  • 129
    • 10044287458 scopus 로고    scopus 로고
    • Constraint-based reasoning and privacy/efficiency tradeoffs in multiagent problem solving
    • Wallace, R. J. & Freuder, E. C. 2005. Constraint-based reasoning and privacy/efficiency tradeoffs in multiagent problem solving. Artificial Intelligence 161, 209-227
    • (2005) Artificial Intelligence , vol.161 , pp. 209-227
    • Wallace, R.J.1    Freuder, E.C.2
  • 132
    • 52149114700 scopus 로고    scopus 로고
    • Intelligent agents living in social virtual environments bringing max into second life
    • Springer
    • Weitnauer, E., Thomas, N., Rabe, F. & Kopp, S. 2008. Intelligent agents living in social virtual environments bringing max into second life. In Intelligent Virtual Agents (IVA). Springer, 552-553
    • (2008) Intelligent Virtual Agents (IVA , pp. 552-553
    • Weitnauer, E.1    Thomas, N.2    Rabe, F.3    Kopp, S.4
  • 134
    • 0037672590 scopus 로고
    • The origins of modern claims to privacy
    • Schoeman, F. D. (ed.). Cambridge University Press
    • Westin, A. 1984. The origins of modern claims to privacy. In Philosophical Dimensions of Privacy: An Anthology, Schoeman, F. D. (ed.). Cambridge University Press, 56-74
    • (1984) Philosophical Dimensions of Privacy: An Anthology , pp. 56-74
    • Westin, A.1
  • 136
    • 0242334211 scopus 로고    scopus 로고
    • Adk: An agent development kit based on a formal design model for multi-Agent systems
    • Xu, H. & Shatz, S. M. 2003. Adk: An agent development kit based on a formal design model for multi-Agent systems. Journal of Automated Software Engineering 10, 337-365
    • (2003) Journal of Automated Software Engineering , vol.10 , pp. 337-365
    • Xu, H.1    Shatz, S.M.2
  • 140
    • 10044289752 scopus 로고    scopus 로고
    • Secure distributed constraint satisfaction: Reaching agreement without revealing private information
    • Yokoo, M., Suzuki, K. & Hirayama, K. 2005. Secure distributed constraint satisfaction: Reaching agreement without revealing private information. Artificial Intelligence 161, 229-245
    • (2005) Artificial Intelligence , vol.161 , pp. 229-245
    • Yokoo, M.1    Suzuki, K.2    Hirayama, K.3
  • 142
    • 77954584058 scopus 로고    scopus 로고
    • To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
    • Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds ACM
    • Zheleva, E. & Getoor, L. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In WWW '09: Proceedings of the 18th International Conference on World Wide Web, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 531-540
    • (2009) WWW ' 09: Proceedings of the 18th International Conference on World Wide Web , pp. 531-540
    • Zheleva, E.1    Getoor, L.2
  • 143
    • 67649659862 scopus 로고    scopus 로고
    • Deriving private information from association rule mining results
    • Ioannidis, Y. E., Lee D. L. & Ng, R. T. (eds). IEEE Computer Society
    • Zhu, Z., Wang, G. & Du, W. 2009. Deriving private information from association rule mining results. In Proceedings of the 2009 IEEE International Conference on Data Engineering, Ioannidis, Y. E., Lee, D. L. & Ng, R. T. (eds). IEEE Computer Society, 18-29.
    • (2009) Proceedings of the 2009 IEEE International Conference on Data Engineering , pp. 18-29
    • Zhu, Z.1    Wang, G.2    Du, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.