-
1
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
Feldman, S. & Wellman M. (eds ACM
-
Ackerman, M. S., Cranor, L. F. & Reagle, J. 1999. Privacy in e-commerce: Examining user scenarios and privacy preferences. In EC'99: Proceedings of the 1st ACMConference on Electronic Commerce, Feldman, S. & Wellman, M. (eds). ACM, 1-8
-
(1999)
EC'99: Proceedings of the 1st ACMConference on Electronic Commerce
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
2
-
-
70350357233
-
-
Auerbach Publications
-
Acquisti, A., Gritzalis, S., Lambrinoudakis, C. & di Vimercati, S. (eds) 2008. Digital Privacy: Theory, Technologies, and Practices. Auerbach Publications
-
(2008)
Digital Privacy: Theory, Technologies, and Practices
-
-
Acquisti, A.1
Gritzalis, S.2
Lambrinoudakis, C.3
Di Vimercati, S.4
-
3
-
-
33751050410
-
Privacy-preserving demographic filtering
-
SAC '06
-
Aïmeur, E., Brassard, G., Fernandez, J. M. & Onana, F. S. M. 2006. Privacy-preserving demographic filtering. In Proceedings of the 2006 ACM Symposium on Applied computing, SAC '06, 872-878
-
(2006)
Proceedings of the 2006 ACM Symposium on Applied computing
, pp. 872-878
-
-
Aïmeur, E.1
Brassard, G.2
Fernandez, J.M.3
Onana, F.S.M.4
-
4
-
-
77956903712
-
A performance evaluation of three multiagent platforms
-
Alberola, J. M., Such, J. M., Garcia-Fornes, A., Espinosa, A. & Botti, V. 2010. A performance evaluation of three multiagent platforms. Artificial Intelligence Review 34, 145-176
-
(2010)
Artificial Intelligence Review
, vol.34
, pp. 145-176
-
-
Alberola, J.M.1
Such, J.M.2
Garcia-Fornes, A.3
Espinosa, A.4
Botti, V.5
-
6
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Barth, A., Datta, A., Mitchell, J. C. & Nissenbaum, H. 2006. Privacy and contextual integrity: Framework and applications. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE Computer Society, 184-198
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE Computer Society
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
7
-
-
34249874298
-
User centricity: A taxonomy and open issues
-
Bhargav-Spantzel, A., Camenisch, J., Gross, T. & Sommer, D. 2007. User centricity: A taxonomy and open issues. Journal of Computer Security 15, 493-527
-
(2007)
Journal of Computer Security
, vol.15
, pp. 493-527
-
-
Bhargav-Spantzel, A.1
Camenisch, J.2
Gross, T.3
Sommer, D.4
-
8
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
WWW '09, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds ACM
-
Bilge, L., Strufe, T., Balzarotti, D. & Kirda, E. 2009. All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW '09, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 551-560
-
(2009)
Proceedings of the 18th International Conference on World Wide Web
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
10
-
-
85174589130
-
Introduction to normative multiagent systems
-
Boella, G., van Der Torre, L. & Verhagen, H. (eds). Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI
-
Boella, G., van Der Torre, L. & Verhagen, H. 2007. Introduction to normative multiagent systems. In Normative Multi-Agent Systems, number 07122 in 'Dagstuhl Seminar Proceedings, Boella, G., van Der Torre, L. & Verhagen, H. (eds). Internationales Begegnungs-und Forschungszentrum für Informatik (IBFI
-
(2007)
Normative Multi-Agent Systems number 07122 in 'Dagstuhl Seminar Proceedings
-
-
Boella, G.1
Van Der Torre, L.2
Verhagen, H.3
-
11
-
-
0038752605
-
-
Registratiekamer
-
Borking, J., Van Eck, B., Siepel, P. & Bedrijf, D. 1999. Intelligent Software agents: Turning a Privacy Threat into a Privacy Protector. Registratiekamer
-
(1999)
Intelligent Software agents: Turning a Privacy Threat into a Privacy Protector
-
-
Borking, J.1
Van Eck, B.2
Siepel, P.3
Bedrijf, D.4
-
12
-
-
0005034890
-
A taxonomy of privacy: Repose sanctuary and intimate decisions
-
Bostwick, G. L. 1976. A taxonomy of privacy: Repose sanctuary and intimate decisions. California Law Review 64(5), 1447-1483
-
(1976)
California Law Review
, vol.64
, Issue.5
, pp. 1447-1483
-
-
Bostwick, G.L.1
-
13
-
-
16244376852
-
Anonymity and software agents: An interdisciplinary challenge
-
Brazier, F., Oskamp, A., Prins, C., Schellekens, M. & Wijngaards, N. 2004. Anonymity and software agents: An interdisciplinary challenge. Artificial Intelligence and Law 12, 137-157
-
(2004)
Artificial Intelligence and Law
, vol.12
, pp. 137-157
-
-
Brazier, F.1
Oskamp, A.2
Prins, C.3
Schellekens, M.4
Wijngaards, N.5
-
16
-
-
6144234717
-
-
PhD thesis Department of Computer Science, Carnegie Mellon University
-
Camp, L. J. 1996. Privacy & Reliability in Internet Commerce. PhD thesis, Department of Computer Science, Carnegie Mellon University
-
(1996)
Privacy & Reliability in Internet Commerce
-
-
Camp, L.J.1
-
18
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 84-90
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-90
-
-
Chaum, D.1
-
19
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM 28, 1030-1044
-
(1985)
Communications of the ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
20
-
-
77954718437
-
Privacy-preserving data publishing
-
Chen, B.-C., Kifer, D., LeFevre, K. & Machanavajjhala, A. 2009. Privacy-preserving data publishing. Foundations and Trends in Databases 2(1-2), 1-167
-
(2009)
Foundations and Trends in Databases
, vol.2
, Issue.1-2
, pp. 1-167
-
-
Chen, B.-C.1
Kifer, D.2
LeFevre, K.3
Machanavajjhala, A.4
-
21
-
-
29244445484
-
Sybil proof reputation mechanisms
-
P2PECON '05, Friedman, E. & Sirer, E. G. (eds ACM
-
Cheng, A. & Friedman, E. (2005), Sybil proof reputation mechanisms. In Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-To-Peer Systems, P2PECON '05, Friedman, E. & Sirer, E. G. (eds). ACM, 128-132
-
(2005)
Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-To-Peer Systems
, pp. 128-132
-
-
Cheng, A.1
Friedman, E.2
-
23
-
-
77954728083
-
Privacy and artificial agents, or, is google reading my email?
-
Sangal, R., Mehta, H. & Bagga, R. K. (eds Morgan Kaufmann Publishers Inc
-
Chopra, S. & White, L. 2007. Privacy and artificial agents, or, is google reading my email? In Proceedings of the 20th International Joint Conference on Artificial Intelligence, Sangal, R., Mehta, H. & Bagga, R. K. (eds). Morgan Kaufmann Publishers Inc., 1245-1250
-
(2007)
Proceedings of the 20th International Joint Conference on Artificial Intelligence
, pp. 1245-1250
-
-
Chopra, S.1
White, L.2
-
24
-
-
84868890692
-
An architecture for agent-based privacy-preserving information filtering
-
Privacy, Deception and Fraud in Agent Systems
-
Cissèe, R. 2003. An architecture for agent-based privacy-preserving information filtering. In Proceedings of the Sixth International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems
-
(2003)
Proceedings of the Sixth International Workshop on Trust
-
-
Cissèe, R.1
-
25
-
-
60349108046
-
An agent-based approach for privacy-preserving recommender systems
-
AAMAS '07, Durfee, E., Yokoo M., Huhns, M. & Shehory, O. (eds ACM 8
-
Cissèe, R. & Albayrak, S. 2007. An agent-based approach for privacy-preserving recommender systems. In Proceedings of the 6th International JointCconference on Autonomous Agents and Multiagent Systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 182:1-182:8
-
(2007)
Proceedings of the 6th International JointCconference on Autonomous Agents and Multiagent Systems
, vol.182
, pp. 1-182
-
-
Cissèe, R.1
Albayrak, S.2
-
26
-
-
77953549584
-
Privacy enhancing identity management: Protection against re-identification and profiling
-
Atluri, V., Samarati, P. & Goto, A. (eds ACM
-
Claub, S., Kesdogan, D. & Kölsch, T. 2005. Privacy enhancing identity management: Protection against re-identification and profiling. In DIM '05: Proceedings of the 2005 Workshop on Digital Identity Management, Atluri, V., Samarati, P. & Goto, A. (eds). ACM, 84-93
-
(2005)
DIM ' 05: Proceedings of the 2005 Workshop on Digital Identity Management
, pp. 84-93
-
-
Claub, S.1
Kesdogan, D.2
Kölsch, T.3
-
27
-
-
70349330796
-
Sensitive data transaction in hippocratic multiagent systems
-
Artikis, A., Picard, G. & Vercouter, L. (eds . Springer-Verlag
-
Crépin, L, Demazeau, Y., Boissier, O. & Jacquenet, F. 2009. Sensitive data transaction in hippocratic multiagent systems. In 'Engineering Societies in the Agents World IX', Artikis, A., Picard, G. & Vercouter, L. (eds). Springer-Verlag, 85-101
-
(2009)
'Engineering Societies in the Agents World IX
, pp. 85-101
-
-
Crépin, L.1
Demazeau, Y.2
Boissier, O.3
Jacquenet, F.4
-
28
-
-
55349098241
-
Hippocratic multi-Agent systems
-
Crépin, L., Vercouter, L., Boissier, O., Demazeau, Y. & Jacquenet, F. 2008. Hippocratic multi-Agent systems. In Proceedings of the Tenth International Conference on Enterprise Information Systems ICEIS, 301-307
-
(2008)
Proceedings of the Tenth International Conference on Enterprise Information Systems ICEIS
, pp. 301-307
-
-
Crépin, L.1
Vercouter, L.2
Boissier, O.3
Demazeau, Y.4
Jacquenet, F.5
-
29
-
-
80955126793
-
Open issues for normative multi-Agent systems
-
Criado, N., Argente, E. & Botti, V. 2011. Open issues for normative multi-Agent systems. AI Communications 24(3), 233-264
-
(2011)
AI Communications
, vol.24
, Issue.3
, pp. 233-264
-
-
Criado, N.1
Argente, E.2
Botti, V.3
-
30
-
-
85006337537
-
Designing virtual organizations
-
volume 55 of Advances in Soft Computing, Salamanca, Spain
-
Criado, N., Argente, E., Julian, V. & Botti, V. 2009. Designing virtual organizations. In Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS2009), volume 55 of Advances in Soft Computing, Salamanca, Spain, 440-449
-
(2009)
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS2009)
, pp. 440-449
-
-
Criado, N.1
Argente, E.2
Julian, V.3
Botti, V.4
-
31
-
-
85051959235
-
Privacy-preserving query answering in logic-based information systems
-
Ghallab M., Spyropoulos, C., Fakotakis, N. & Avouris, N. (eds). IOS Press
-
Cuenca Grau, B. & Horrocks, I. 2008. Privacy-preserving query answering in logic-based information systems. In Proceedings of the 2008 Conference on ECAI 2008: 18th European Conference on Artificial Intelligence, Ghallab, M., Spyropoulos, C., Fakotakis, N. & Avouris, N. (eds). IOS Press, 40-44
-
(2008)
Proceedings of the 2008 Conference on ECAI 2008: 18th European Conference on Artificial Intelligence
, pp. 40-44
-
-
Cuenca Grau, B.1
Horrocks, I.2
-
32
-
-
79959825296
-
Anonymity metrics revisited
-
Dolev, S., Ostrovsky, R. & Pfitzmann, A. (eds). IBFI
-
Diaz, C. 2006. Anonymity metrics revisited. In Anonymous Communication and its Applications, number 05411 in 'Dagstuhl Seminar Proceedings, Dolev, S., Ostrovsky, R. & Pfitzmann, A. (eds). IBFI, 147-166
-
(2006)
Anonymous Communication and its Applications number 05411 in 'Dagstuhl Seminar Proceedings
, pp. 147-166
-
-
Diaz, C.1
-
37
-
-
34249739074
-
On agent technology for e-commerce: Trust, security and legal issues
-
Fasli, M. 2007b. On agent technology for e-commerce: Trust, security and legal issues. Knowledge Engineering Review 22(1), 3-35
-
(2007)
Knowledge Engineering Review
, vol.22
, Issue.1
, pp. 3-35
-
-
Fasli, M.1
-
38
-
-
84900004783
-
-
FIPA FIPA
-
FIPA 1998. FIPA Agent Security Management, FIPA. http://www.fipa.org/ specs/fipa00020/ OC00020A.html
-
(1998)
FIPA Agent Security Management
-
-
-
45
-
-
27644597142
-
Agent-based semantic web services
-
Gibbins, N., Harris, S. & Shadbolt, N. 2004. Agent-based semantic web services. Web Semantics: Science, Services and Agents on the World Wide Web 1(2), 141-154
-
(2004)
Web Semantics: Science, Services and Agents on the World Wide Web
, vol.1
, Issue.2
, pp. 141-154
-
-
Gibbins, N.1
Harris, S.2
Shadbolt, N.3
-
46
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Goldschlag, D., Reed, M. & Syverson, P. 1999. Onion routing for anonymous and private internet connections. Communications of the ACM 42, 39-41
-
(1999)
Communications of the ACM
, vol.42
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
47
-
-
63149113277
-
-
Cambridge University Press, chapter Self-Disclosure in Personal Relationships
-
Green, K., Derlega, V. J. & Mathews, A. 2006. In The Cambridge Handbook of Personal Relationships. Cambridge University Press, chapter Self-Disclosure in Personal Relationships, 409-427
-
(2006)
The Cambridge Handbook of Personal Relationships
, pp. 409-427
-
-
Green, K.1
Derlega, V.J.2
Mathews, A.3
-
48
-
-
60349086001
-
Ssdpop: Improving the privacy of dcop with secret sharing
-
AAMAS '07, Durfee, E., Yokoo M., Huhns, M. & Shehory, O. (eds ACM 3
-
Greenstadt, R., Grosz, B. & Smith, M. D. 2007. Ssdpop: Improving the privacy of dcop with secret sharing. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 171:1-171:3
-
(2007)
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent systems
, vol.171
, pp. 1-171
-
-
Greenstadt, R.1
Grosz, B.2
Smith, M.D.3
-
49
-
-
33750742251
-
Analysis of privacy loss in distributed constraint optimization
-
Cohn, A. (ed.). AAAI Press
-
Greenstadt, R., Pearce, J. P. & Tambe, M. 2006. Analysis of privacy loss in distributed constraint optimization. In Proceedings of the 21st National Conference on Artificial Intelligence-Volume 1, Cohn, A. (ed.). AAAI Press, 647-653
-
(2006)
Proceedings of the 21st National Conference on Artificial Intelligence
, vol.1
, pp. 647-653
-
-
Greenstadt, R.1
Pearce, J.P.2
Tambe, M.3
-
50
-
-
33749016498
-
Information revelation and privacy in online social networks
-
Atluri, V., De Capitani di Vimercati, S. & Dingledine, R. (eds). ACM
-
Gross, R. & Acquisti, A. 2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Atluri, V., De Capitani di Vimercati, S. & Dingledine, R. (eds). ACM, 71-80
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
-
51
-
-
1642281602
-
Privacy enhancing identity management
-
Hansen, M., Berlich, P., Camenisch, J., Clau, S., Pfitzmann, A. & Waidner, M. 2004. Privacy enhancing identity management. Information Security Technical Report 9(1), 35-44
-
(2004)
Information Security Technical Report
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clau, S.4
Pfitzmann, A.5
Waidner, M.6
-
52
-
-
41949117635
-
Privacy and identity management
-
Hansen, M., Schwartz, A. & Cooper, A. 2008. Privacy and identity management. IEEE Security & Privacy 6(2), 38-45
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.2
, pp. 38-45
-
-
Hansen, M.1
Schwartz, A.2
Cooper, A.3
-
53
-
-
0034861231
-
Privacy protection in electronic commerce-A theoretical framework
-
Head, M. & Yuan, Y. 2001. Privacy protection in electronic commerce-A theoretical framework. Human Systems Management 20(2), 149-160
-
(2001)
Human Systems Management
, vol.20
, Issue.2
, pp. 149-160
-
-
Head, M.1
Yuan, Y.2
-
55
-
-
0041540817
-
Building consumer trust online
-
Hoffman, D., Novak, T. & Peralta, M. 1999. Building consumer trust online. Communications of the ACM 42(4), 80-85
-
(1999)
Communications of the ACM
, vol.42
, Issue.4
, pp. 80-85
-
-
Hoffman, D.1
Novak, T.2
Peralta, M.3
-
56
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
31
-
Hoffman, K., Zage, D. & Nita-Rotaru, C. 2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42, 1:1-1:31
-
(2009)
ACM Computing Surveys
, vol.42
, Issue.1
, pp. 1-1
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
57
-
-
27644505323
-
Valuating privacy
-
Huberman, B. A., Adar, E. & Fine, L. R. 2005. Valuating privacy. IEEE Security and Privacy 3(5), 22-25
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.5
, pp. 22-25
-
-
Huberman, B.A.1
Adar, E.2
Fine, L.R.3
-
58
-
-
77956183594
-
A secure mobile agents platform
-
Ismail, L. 2008. A secure mobile agents platform. Journal of Communications 3(2), 1-12
-
(2008)
Journal of Communications
, vol.3
, Issue.2
, pp. 1-12
-
-
Ismail, L.1
-
59
-
-
33646594936
-
-
JADE Board
-
JADE Board 2005. Jade security guide, http://jade.tilab.com
-
(2005)
Jade security guide
-
-
-
60
-
-
8344248769
-
Design and implementation of a secure multi-Agent marketplace
-
Jaiswal, A., Kim, Y. & Gini, M. L. 2004. Design and implementation of a secure multi-Agent marketplace. Electronic Commerce Research and Applications 3(4), 355-368
-
(2004)
Electronic Commerce Research and Applications
, vol.3
, Issue.4
, pp. 355-368
-
-
Jaiswal, A.1
Kim, Y.2
Gini, M.L.3
-
61
-
-
0035627861
-
Automated negotiation: Prospects, methods and challenges
-
Jennings, N., Faratin, P., Lomuscio, A., Parsons, S., Wooldridge, M. & Sierra, C. 2001. Automated negotiation: Prospects, methods and challenges. Group Decision and Negotiation 10(2), 199-215
-
(2001)
Group Decision and Negotiation
, vol.10
, Issue.2
, pp. 199-215
-
-
Jennings, N.1
Faratin, P.2
Lomuscio, A.3
Parsons, S.4
Wooldridge, M.5
Sierra, C.6
-
63
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang, A., Ismail, R. & Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decision Support System 43(2), 618-644
-
(2007)
Decision Support System
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
65
-
-
0347989497
-
Information privacy in cyberspace transactions
-
Kang, J. 1998. Information privacy in cyberspace transactions. Stanford Law Review 50(4), 1193-1294
-
(1998)
Stanford Law Review
, vol.50
, Issue.4
, pp. 1193-1294
-
-
Kang, J.1
-
67
-
-
61449195430
-
Identity theft, identity fraud and/or identity-related crime
-
Koops, B.-J. & Leenes, R. 2006. Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit-DuD 30, 553-556
-
(2006)
Datenschutz und Datensicherheit-DuD
, vol.30
, pp. 553-556
-
-
Koops, B.-J.1
Leenes, R.2
-
68
-
-
15344338536
-
Anonymous communications for mobile agents
-
Korba, L., Song, R. & Yee, G. 2002. Anonymous communications for mobile agents. In Proceedings of the 4th InternationalWorkshop onMobile Agents for Telecommunication Applications,MATA '02, 171-181
-
(2002)
Proceedings of the 4th InternationalWorkshop onMobile Agents for Telecommunication Applications,MATA
, vol.2
, pp. 171-181
-
-
Korba, L.1
Song, R.2
Yee, G.3
-
70
-
-
84884806715
-
Contextual integrity and privacy enforcing norms for virtual communities
-
Organization, Institutions and Norms in Multi-Agent Systems (COIN@MALLOW2010
-
Krupa, Y. & Vercouter, L. 2010. Contextual integrity and privacy enforcing norms for virtual communities. In 11th International Workshop on Coordination, Organization, Institutions and Norms in Multi-Agent Systems (COIN@MALLOW2010), 150-165
-
(2010)
11th International Workshop on Coordination
, pp. 150-165
-
-
Krupa, Y.1
Vercouter, L.2
-
71
-
-
84958987526
-
Beyond k-Anonymity: A decision theoretic framework for assessing privacy risk
-
Lebanon, G., Scannapieco, M., Fouad, M. R. & Bertino, E. 2006. Beyond k-Anonymity: A decision theoretic framework for assessing privacy risk. In Privacy in Statistical Databases, 217-232
-
(2006)
Privacy in Statistical Databases
, pp. 217-232
-
-
Lebanon, G.1
Scannapieco, M.2
Fouad, M.R.3
Bertino, E.4
-
74
-
-
84900037566
-
Privacy and trust in online interactions
-
Chen, K. & Fadlalla, A. (eds). Information Science Reference
-
Lilien, L. & Bhargava, B. 2008. Privacy and trust in online interactions. In Online Consumer Protection: Theories of Human Relativism, Chen, K. & Fadlalla, A. (eds). Information Science Reference, 85-122
-
(2008)
Online Consumer Protection: Theories of Human Relativism
, pp. 85-122
-
-
Lilien, L.1
Bhargava, B.2
-
75
-
-
0005238259
-
Security of the internet
-
Longstaff, T., Ellis, J., Shawn, H., Lipson, H., Mcmillan, R., Pesante, H. L. & Simmel, D. 1997. Security of the internet. The Froehlich/Kent Encyclopedia of Telecommunications 15, 231-255
-
(1997)
The Froehlich/Kent Encyclopedia of Telecommunications
, vol.15
, pp. 231-255
-
-
Longstaff, T.1
Ellis, J.2
Shawn, H.3
Lipson, H.4
Mcmillan, R.5
Pesante, H.L.6
Simmel, D.7
-
76
-
-
33745646576
-
-
AgentLink
-
Luck, M., McBurney, P., Shehory, O. & Willmott, S. 2005. Agent Technology: Computing as Interaction (A Roadmap for Agent Based Computing). AgentLink
-
(2005)
Agent Technology: Computing as Interaction (A Roadmap for Agent Based Computing
-
-
Luck, M.1
McBurney, P.2
Shehory, O.3
Willmott, S.4
-
77
-
-
33646000597
-
Privacy loss in distributed constraint reasoning: A quantitative framework for analysis and its applications
-
Maheswaran, R., Pearce, J., Bowring, E., Varakantham, P. & Tambe, M. 2006. Privacy loss in distributed constraint reasoning: A quantitative framework for analysis and its applications. Autonomous Agents and Multi-Agent Systems 13, 27-60
-
(2006)
Autonomous Agents and Multi-Agent Systems
, vol.13
, pp. 27-60
-
-
Maheswaran, R.1
Pearce, J.2
Bowring, E.3
Varakantham, P.4
Tambe, M.5
-
78
-
-
0036355110
-
Intellishopper: A proactive, personal, private shopping assistant
-
Menczer, F., Street, W. N., Vishwakarma, N., Monge, A. E. & Jakobsson, M. 2002. Intellishopper: A proactive, personal, private shopping assistant. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 3, AAMAS '02, 1001-1008
-
(2002)
Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 3, AAMAS '02
, pp. 1001-1008
-
-
Menczer, F.1
Street, W.N.2
Vishwakarma, N.3
Monge, A.E.4
Jakobsson, M.5
-
79
-
-
0141770933
-
Masif: The omg mobile agent system interoperability facility
-
10.1007/BF01324942. http:// dx.doi.org/10.1007/BF01324942
-
Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S., Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C., Virdhagriswaran, S. & White, J. 1998. Masif: The omg mobile agent system interoperability facility. Personal and Ubiquitous Computing 2, 117-129. 10.1007/BF01324942. http:// dx.doi.org/10.1007/BF01324942
-
(1998)
Personal and Ubiquitous Computing
, vol.2
, pp. 117-129
-
-
Milojicic, D.1
Breugst, M.2
Busse, I.3
Campbell, J.4
Covaci, S.5
Friedman, B.6
Kosaka, K.7
Lange, D.8
Ono, K.9
Oshima, M.10
Tham, C.11
Virdhagriswaran, S.12
White, J.13
-
80
-
-
0028477939
-
Experience with a learning personal assistant
-
Mitchell, T., Caruana, R., Freitag, D., McDermott, J. & Zabowski, D. 1994. Experience with a learning personal assistant. Communications of the ACM 37(7), 80-91
-
(1994)
Communications of the ACM
, vol.37
, Issue.7
, pp. 80-91
-
-
Mitchell, T.1
Caruana, R.2
Freitag, D.3
McDermott, J.4
Zabowski, D.5
-
81
-
-
0344519548
-
A taxonomy of recommender agents on the internet
-
Montaner, M., López, B. & De La Rosa, J. 2003. A taxonomy of recommender agents on the internet. Artificial Intelligence Review 19(4), 285-330
-
(2003)
Artificial Intelligence Review
, vol.19
, Issue.4
, pp. 285-330
-
-
Montaner, M.1
López, B.2
De La Rosa, J.3
-
83
-
-
0003899818
-
-
IETF
-
Neuman, C., Yu, T., Hartman, S. & Raeburn, K. 2005. The Kerberos Network Authentication Service (V5), number 4120 in 'Request for Comments. IETF
-
(2005)
The Kerberos Network Authentication Service V5 number 4120 in 'Request for Comments
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
84
-
-
1842538795
-
Privacy as contextual integrity
-
Nissenbaum, H. 2004. Privacy as contextual integrity. Washington Law Review 79(1
-
(2004)
Washington Law Review
, vol.79
, pp. 1
-
-
Nissenbaum, H.1
-
85
-
-
1142268161
-
Privacy, economics, and price discrimination on the internet
-
ICEC '03, Sadeh, N., Dively M. J., Kauffman, M., Labrou, Y., Shehory, O., Telan, R. & Cranor, L. (eds ACM
-
Odlyzko, A. 2003. Privacy, economics, and price discrimination on the internet. In Proceedings of the 5th International Conference on Electronic Commerce, ICEC '03, Sadeh, N., Dively, M. J., Kauffman, M., Labrou, Y., Shehory, O., Telan, R. & Cranor, L. (eds). ACM, 355-366
-
(2003)
Proceedings of the 5th International Conference on Electronic Commerce
, pp. 355-366
-
-
Odlyzko, A.1
-
86
-
-
84869136735
-
A study of preferences for sharing and privacy
-
Van Der Veer, G. & Gale, C. (eds ACM
-
Olson, J. S., Grudin, J. & Horvitz, E. 2005. A study of preferences for sharing and privacy. In CHI '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems, Van Der Veer, G. & Gale, C. (eds). ACM, 1985-1988
-
(2005)
CHI ' 05: CHI '05 Extended Abstracts on Human Factors in Computing Systems
, pp. 1985-1988
-
-
Olson, J.S.1
Grudin, J.2
Horvitz, E.3
-
87
-
-
0038037379
-
Unpacking privacy for a networked world
-
Cockton, G. & Korhonen, P. (eds ACM
-
Palen, L. & Dourish, P. 2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Ssystems, Cockton, G. & Korhonen, P. (eds). ACM, 129-136
-
(2003)
Proceedings of the SIGCHI Conference on Human Factors in Computing Ssystems
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
89
-
-
78649989557
-
-
Pfitzmann, A. & Hansen, M. 2010. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, http://dud.inf.tu- dresden.de/Anon Terminology.shtml. v0.34
-
(2010)
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management
-
-
Pfitzmann, A.1
Hansen, M.2
-
90
-
-
38349039899
-
Privacy management in user-centred multi-Agent systems
-
Springer
-
Piolle, G., Demazeau, Y. & Caelen, J. 2007. Privacy management in user-centred multi-Agent systems. In Engineering Societies in the Agents World VII, Lecture Notes in Computer Science 4457, 354-367. Springer
-
(2007)
Engineering Societies in the Agents World VII, Lecture Notes in Computer Science
, vol.4457
, pp. 354-367
-
-
Piolle, G.1
Demazeau, Y.2
Caelen, J.3
-
92
-
-
7044262736
-
Specifying standard security mechanisms in multi-Agent systems
-
AAMAS'02. Springer-Verlag
-
Poslad, S., Charlton, P. & Calisti, M. 2003. Specifying standard security mechanisms in multi-Agent systems. In Proceedings of the 2002 International Conference on Trust, Reputation, and Security: Theories and Practice, AAMAS'02. Springer-Verlag, 163-176. http://portal.acm.org/citation. cfm?id5 1762128.1762141
-
(2003)
Proceedings of the 2002 International Conference on Trust, Reputation, and Security: Theories and Practice
, pp. 163-176
-
-
Poslad, S.1
Charlton, P.2
Calisti, M.3
-
93
-
-
80053016826
-
Enforcing security in the agent scape middleware
-
MidSec '08, Scandariato, R. & Russello, G. (eds ACM
-
Quillinan, T. B., Warnier, M., Oey, M., Timmer, R. & Brazier, F. 2008. Enforcing security in the agent scape middleware. In Proceedings of the 2008 Workshop on Middleware Security, MidSec '08, Scandariato, R. & Russello, G. (eds). ACM, 25-30
-
(2008)
Proceedings of the 2008 Workshop on Middleware Security
, pp. 25-30
-
-
Quillinan, T.B.1
Warnier, M.2
Oey, M.3
Timmer, R.4
Brazier, F.5
-
94
-
-
4544375031
-
Trust in multi-Agent systems
-
Ramchurn, S., Huynh, D. & Jennings, N. 2004. Trust in multi-Agent systems. The Knowledge Engineering Review 19(1), 1-25
-
(2004)
The Knowledge Engineering Review
, vol.19
, Issue.1
, pp. 1-25
-
-
Ramchurn, S.1
Huynh, D.2
Jennings, N.3
-
95
-
-
84892196016
-
-
Springer Publishing Company, Incorporated. Recursion Software Inc. Voyager security guide
-
Rannenberg, K., Royer, D. & Deuker, A. (eds 2009. The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Incorporated
-
(2009)
The Future of Identity in the Information Society: Challenges and Opportunities
, vol.2008
-
-
Rannenberg, K.1
Royer, D.2
Deuker, A.3
-
96
-
-
80052831765
-
-
Recursion Software Inc
-
Recursion Software Inc. 2008. Voyager security guide http://www. recursionsw.com/
-
(2008)
Voyager security guide
-
-
-
98
-
-
85006210403
-
Review on computational trust and reputation models
-
Sabater, J. & Sierra, C. 2005. Review on computational trust and reputation models. Artificial Intelligence Review 24, 33-60
-
(2005)
Artificial Intelligence Review
, vol.24
, pp. 33-60
-
-
Sabater, J.1
Sierra, C.2
-
101
-
-
0037402796
-
Privacy-enhancing technologies-Approaches and development
-
Senicar, V., Jerman-Blazic, B. & Klobucar, T. 2003. Privacy-enhancing technologies-Approaches and development. Computer Standards & Interfaces 25(2), 147-158
-
(2003)
Computer Standards & Interfaces
, vol.25
, Issue.2
, pp. 147-158
-
-
Senicar, V.1
Jerman-Blazic, B.2
Klobucar, T.3
-
102
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C. E. 1948. A mathematical theory of communication. Bell System Technical Journal 27(3), 379-423
-
(1948)
Bell System Technical Journal
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
-
104
-
-
80052268525
-
Agreement computing
-
Sierra, C., Botti, V. & Ossowski, S. 2011. Agreement computing. KI-Künstliche Intelligenz 25(1), 57-61
-
(2011)
KI-Künstliche Intelligenz
, vol.25
, Issue.1
, pp. 57-61
-
-
Sierra, C.1
Botti, V.2
Ossowski, S.3
-
105
-
-
84899928506
-
Information-based deliberation
-
Padgham L., Parkes, D. C., Müller, J. P. & Parsons, S. (eds). International Foundation for Autonomous Agents and Multiagent Systems
-
Sierra, C. & Debenham, J. 2008. Information-based deliberation. In AAMAS '08: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, Padgham, L., Parkes, D. C., Müller, J. P. & Parsons, S. (eds). International Foundation for Autonomous Agents and Multiagent Systems, 689-696
-
(2008)
AAMAS '08: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems
, pp. 689-696
-
-
Sierra, C.1
Debenham, J.2
-
107
-
-
0000981743
-
Information privacy: Measuring individuals' concerns about organizational practices
-
Smith, H. J. & Milberg, S. J. 1996. Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly 20, 167-196
-
(1996)
MIS Quarterly
, vol.20
, pp. 167-196
-
-
Smith, H.J.1
Milberg, S.J.2
-
109
-
-
0036045758
-
Conceptualizing privacy
-
Solove, D. 2002. Conceptualizing privacy. California Law Review 90(4), 1087-1155
-
(2002)
California Law Review
, vol.90
, Issue.4
, pp. 1087-1155
-
-
Solove, D.1
-
115
-
-
84867541094
-
-
PhD thesis, Departament De Sistemes Informàtics i Computació, Universitat Politècnica De València
-
Such, J. M. 2011. Enhancing Privacy in Multi-Agent Systems. PhD thesis, Departament De Sistemes Informàtics i Computació, Universitat Politècnica De València
-
(2011)
Enhancing Privacy in Multi-Agent Systems
-
-
Such, J.M.1
-
116
-
-
80052866365
-
A group-oriented secure multiagent platform
-
Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A. 2011a. A group-oriented secure multiagent platform. Software: Practice and Experience 41(11), 1289-1302
-
(2011)
Software: Practice and Experience
, vol.41
, Issue.11
, pp. 1289-1302
-
-
Such, J.M.1
Alberola, J.M.2
Espinosa, A.3
Garcia-Fornes, A.4
-
117
-
-
84870065709
-
Magentix2: A privacy-enhancing Agent Platform
-
Such, J. M., Garcia-Fornes, A., Espinosa, A. & Bellver, J. 2013. Magentix2: A privacy-enhancing Agent Platform. Engineering Applications of Artificial Intelligence 26(1), 96-109
-
(2013)
Engineering Applications of Artificial Intelligence
, vol.26
, Issue.1
, pp. 96-109
-
-
Such, J.M.1
Garcia-Fornes, A.2
Espinosa, A.3
Bellver, J.4
-
118
-
-
80052264832
-
Partial identities as a foundation for trust and reputation
-
Such, J. M., Espinosa, A., Garcia-Fornes, A. & Botti, V. 2011b. Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence 24(7), 1128-1136
-
(2011)
Engineering Applications of Artificial Intelligence
, vol.24
, Issue.7
, pp. 1128-1136
-
-
Such, J.M.1
Espinosa, A.2
Garcia-Fornes, A.3
Botti, V.4
-
119
-
-
84899447481
-
Privacy-intimacy tradeoff in selfdisclosure
-
IFAAMAS
-
Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C. 2011d. Privacy-intimacy tradeoff in selfdisclosure. In Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS2011). IFAAMAS, 1189-1190
-
(2011)
Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS2011
, pp. 1189-1190
-
-
Such, J.M.1
Espinosa, A.2
Garcia-Fornes, A.3
Sierra, C.4
-
120
-
-
84862836602
-
Self-disclosure decision making based on intimacy and privacy
-
Such, J. M., Espinosa, A., Garcia-Fornes, A. & Sierra, C. 2012a. Self-disclosure decision making based on intimacy and privacy. Information Sciences 211, 93-111
-
(2012)
Information Sciences
, vol.211
, pp. 93-111
-
-
Such, J.M.1
Espinosa, A.2
Garcia-Fornes, A.3
Sierra, C.4
-
121
-
-
84900022686
-
Strategic pseudonym change in agent-based E-commerce
-
Valencia, Spain
-
Such, J. M., Serrano, E., Botti, V. & Garca-Fornes, A. 2012b. Strategic pseudonym change in agent-based E-commerce. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012), Valencia, Spain, 1377-1378
-
(2012)
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012)
, pp. 1377-1378
-
-
Such, J.M.1
Serrano, E.2
Botti, V.3
Garca-Fornes, A.4
-
122
-
-
2642522215
-
-
Retrieved February 27 2011, from
-
Taylor, H. 2003. Most People Are ''Privacy Pragmatists'' Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits., Harris Interactive. Retrieved February 27, 2011, from http://www.harrisinteractive. com/vault/Harris-Interactive-Poll-Research-Most-People-Are-Privacy-Pragmatists- Who-While-Conc-2003-03.pdf
-
(2003)
Most People Are ''Privacy Pragmatists'' Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits., Harris Interactive
-
-
Taylor, H.1
-
123
-
-
33845574135
-
Privacy-Aware autonomous agents for pervasive healthcare
-
Tentori, M., Favela, J. & Rodriguez, M. D. 2006. Privacy-Aware autonomous agents for pervasive healthcare. IEEE Intelligent Systems 21, 55-62
-
(2006)
IEEE Intelligent Systems
, vol.21
, pp. 55-62
-
-
Tentori, M.1
Favela, J.2
Rodriguez, M.D.3
-
124
-
-
76249097437
-
Information sharing among autonomous agents in referral networks
-
Joseph, S. R., Despotovic, Z., Moro, G. & Bergamaschi, S. (eds). Springer-Verlag
-
Udupi, Y. B. & Singh, M. P. 2010. Information sharing among autonomous agents in referral networks. In Agents and Peer-To-Peer Computing, Joseph, S. R., Despotovic, Z., Moro, G. & Bergamaschi, S. (eds). Springer-Verlag, 13-26
-
(2010)
Agents and Peer-To-Peer Computing
, pp. 13-26
-
-
Udupi, Y.B.1
Singh, M.P.2
-
127
-
-
84900002141
-
-
Stanford, CA, USA, March 24-26, 2003: Revised and Invited Papers, Lecture Notes in Computer Science 2926 428. Springer-Verlag
-
van Elst, L., Abecker, A. & Dignum, V. 2004. Agent-mediated Knowledge Management: International Symposium Amkm 2003, Stanford, CA, USA, March 24-26, 2003: Revised and Invited Papers, Lecture Notes in Computer Science 2926, 428. Springer-Verlag
-
(2004)
Agent-mediated Knowledge Management: International Symposium Amkm 2003
-
-
Van Elst, L.1
Abecker, A.2
Dignum, V.3
-
128
-
-
33645968049
-
The value of privacy: Optimal strategies for privacy minded agents
-
Pechoucek M., Steiner, D. & Thompson, S. (eds ACM
-
van Otterloo, S. 2005. The value of privacy: Optimal strategies for privacy minded agents. In AAMAS '05: Proceedings of the Fourth International Joint conference on Autonomous Agents and Multiagent Systems, Pechoucek, M., Steiner, D. & Thompson, S. (eds). ACM, 1015-1022
-
(2005)
AAMAS '05: Proceedings of the Fourth International Joint conference on Autonomous Agents and Multiagent Systems
, pp. 1015-1022
-
-
Van Otterloo, S.1
-
129
-
-
10044287458
-
Constraint-based reasoning and privacy/efficiency tradeoffs in multiagent problem solving
-
Wallace, R. J. & Freuder, E. C. 2005. Constraint-based reasoning and privacy/efficiency tradeoffs in multiagent problem solving. Artificial Intelligence 161, 209-227
-
(2005)
Artificial Intelligence
, vol.161
, pp. 209-227
-
-
Wallace, R.J.1
Freuder, E.C.2
-
132
-
-
52149114700
-
Intelligent agents living in social virtual environments bringing max into second life
-
Springer
-
Weitnauer, E., Thomas, N., Rabe, F. & Kopp, S. 2008. Intelligent agents living in social virtual environments bringing max into second life. In Intelligent Virtual Agents (IVA). Springer, 552-553
-
(2008)
Intelligent Virtual Agents (IVA
, pp. 552-553
-
-
Weitnauer, E.1
Thomas, N.2
Rabe, F.3
Kopp, S.4
-
134
-
-
0037672590
-
The origins of modern claims to privacy
-
Schoeman, F. D. (ed.). Cambridge University Press
-
Westin, A. 1984. The origins of modern claims to privacy. In Philosophical Dimensions of Privacy: An Anthology, Schoeman, F. D. (ed.). Cambridge University Press, 56-74
-
(1984)
Philosophical Dimensions of Privacy: An Anthology
, pp. 56-74
-
-
Westin, A.1
-
136
-
-
0242334211
-
Adk: An agent development kit based on a formal design model for multi-Agent systems
-
Xu, H. & Shatz, S. M. 2003. Adk: An agent development kit based on a formal design model for multi-Agent systems. Journal of Automated Software Engineering 10, 337-365
-
(2003)
Journal of Automated Software Engineering
, vol.10
, pp. 337-365
-
-
Xu, H.1
Shatz, S.M.2
-
137
-
-
33947397191
-
Predicting user concerns about online privacy
-
Yao, M. Z., Rice, R. E. & Wallis, K. 2007. Predicting user concerns about online privacy. J American Society for Information Science and Technology 58(5), 710-722
-
(2007)
J American Society for Information Science and Technology
, vol.58
, Issue.5
, pp. 710-722
-
-
Yao, M.Z.1
Rice, R.E.2
Wallis, K.3
-
138
-
-
78649865438
-
An intelligent agent-based model for future personal information markets
-
Toronto, Canada
-
Yassine, A., Shirehjini, A. A. N., Shirmohammadi, S. & Tran, T. T. 2010. An intelligent agent-based model for future personal information markets. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2, 457-460, Toronto, Canada
-
(2010)
IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, vol.2
, pp. 457-460
-
-
Yassine, A.1
Shirehjini, A.A.N.2
Shirmohammadi, S.3
Tran, T.T.4
-
140
-
-
10044289752
-
Secure distributed constraint satisfaction: Reaching agreement without revealing private information
-
Yokoo, M., Suzuki, K. & Hirayama, K. 2005. Secure distributed constraint satisfaction: Reaching agreement without revealing private information. Artificial Intelligence 161, 229-245
-
(2005)
Artificial Intelligence
, vol.161
, pp. 229-245
-
-
Yokoo, M.1
Suzuki, K.2
Hirayama, K.3
-
141
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
Rizzo L., Anderson, T. & McKeown, N. (eds ACM
-
Yu, H., Kaminsky, M., Gibbons, P. B. & Flaxman, A. 2006. Sybilguard: Defending against sybil attacks via social networks. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06, Rizzo, L., Anderson, T. & McKeown, N. (eds). ACM, 267-278. http://doi.acm.org/10.1145/1159913.1159945
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
142
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds ACM
-
Zheleva, E. & Getoor, L. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In WWW '09: Proceedings of the 18th International Conference on World Wide Web, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 531-540
-
(2009)
WWW ' 09: Proceedings of the 18th International Conference on World Wide Web
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
-
143
-
-
67649659862
-
Deriving private information from association rule mining results
-
Ioannidis, Y. E., Lee D. L. & Ng, R. T. (eds). IEEE Computer Society
-
Zhu, Z., Wang, G. & Du, W. 2009. Deriving private information from association rule mining results. In Proceedings of the 2009 IEEE International Conference on Data Engineering, Ioannidis, Y. E., Lee, D. L. & Ng, R. T. (eds). IEEE Computer Society, 18-29.
-
(2009)
Proceedings of the 2009 IEEE International Conference on Data Engineering
, pp. 18-29
-
-
Zhu, Z.1
Wang, G.2
Du, W.3
|