Skip to main content

Sensitive Data Transaction in Hippocratic Multi-Agent Systems

  • Conference paper
Engineering Societies in the Agents World IX (ESAW 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5485))

Included in the following conference series:

Abstract

The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive information about users or groups of users. A typical problem in this context concerns the disclosure of confidential identity data. To tackle this difficulty, we consider in this paper the context of Hippocratic Multi-Agent Systems (HiMAS), a model designed for the privacy management. In this context, we propose a common content language combining meta-policies and application context data on one hand and on the other hand an interaction protocol for the exchange of sensitive data. Based on this proposal, agents providing sensitive data are able to check the compliance of the consumers to the HiMAS principles. The protocol that we propose is validated on a distributed calendar management application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Crépin, L., Vercouter, L., Jaquenet, F., Demazeau, Y., Boissier, O.: Hippocratic multi-agent systems. In: Proceedings of the 10th International Conference of Entreprise Information Systems, pp. 301–308 (2008)

    Google Scholar 

  2. W3C: Plateform for privacy preferences (2002), http://www.w3.org/p3p/

  3. Cranor, L.F.: Web Privacy with P3P. O’Reilly, Sebastopol (2002)

    Google Scholar 

  4. Demazeau, Y., Melaye, D., Verrons, M.-H.: A decentralized calendar system featuring sharing, trusting and negotiating. In: Ali, M., Dapoigny, R. (eds.) IEA/AIE 2006. LNCS, vol. 4031, pp. 731–740. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Thomson, J.J.: The right of privacy. Philosophy and Public Affairs 4, 295–314 (1975)

    Google Scholar 

  6. Demeulenaere, P.: Difficulties of private life characterization from a sociologic point of view. In: Privacy in Information Society, vol. 11 (2002)

    Google Scholar 

  7. Baase, S.: A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  8. Westin, A.F.: Special report: legal safeguards to insure privacy in a computer society. Commun. ACM 10(9), 533–537 (1967)

    Article  Google Scholar 

  9. Warren, S.D., Brandeis, L.D.: The right to privacy. Wadsworth Publ. Co., Belmont (1985)

    Google Scholar 

  10. Lessig, L.: Code and Other Laws of Cyberspace. Basic Books, New York (2000)

    Google Scholar 

  11. Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the European Conference on Computer Supported Cooperative Work (ECSCW), pp. 77–92. Kluwer Academic Publishers, Dordrecht (1993)

    Google Scholar 

  12. Palen, L., Dourish, P.: Unpacking ”privacy” for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York (2003)

    Google Scholar 

  13. Rezgui, A., Ouzzani, M., Bouguettaya, A., Medjahed, B.: Preserving privacy in web services. In: Chiang, R.H.L., Lim, E.P. (eds.) Proceedings of the Workshop on Web Information and Data Management, pp. 56–62. ACM, New York (2002)

    Google Scholar 

  14. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the International Conference Very Large Data Bases, pp. 143–154. Morgan Kaufmann, San Francisco (2002)

    Chapter  Google Scholar 

  15. Bratman, M.E.: Intention, plans, and practical reason. O’Reilly, Harvard University Press, Cambridge (1987)

    Google Scholar 

  16. Sichman, J.S., Demazeau, Y.: Exploiting social reasoning to deal with agency level inconsistency. In: Proceedings of the First International Conference on Multiagent Systems, pp. 352–359. MIT Press, Cambridge (1995)

    Google Scholar 

  17. Sowa, J.F.: Conceptual Structures: Information Processing in Mind and Machine. Addison-Wesley, Reading (1984)

    MATH  Google Scholar 

  18. W3C: Owl web ontology language (2004), http://www.w3.org/tr/owl-features/

  19. Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: P2P-based collaborative spam detection and filtering. In: Proceedings of 4th International Conference on Peer-to-Peer Computing, pp. 176–183. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  20. FIPA: Fipa communicative act library specification (2002), http://www.fipa.org/specs/fipa00037/index.html

  21. Esteva, M., de la Cruz, D., Sierra, C.: Islander: an electronic institutions editor. In: Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, pp. 1045–1052. ACM, New York (2002)

    Chapter  Google Scholar 

  22. Hosmer, H.H.: Metapolicies I. ACM SIGSAC Data Management Workshop 10(2-3), 18–43 (1991)

    Article  Google Scholar 

  23. Hosmer, H.H.: Metapolicies II. In: Proceeding of the 15th National Computer Security Conference, pp. 369–378. Elsevier Advanced Technology Publications, Amsterdam (1992)

    Google Scholar 

  24. Kühnhauser, W.E.: A paradigm for user-defined security policies. In: Symposium on Reliable Distributed Systems, pp. 135–144 (1995)

    Google Scholar 

  25. Lupu, E., Sloman, M., Dulay, N., Damianou, N.: Ponder: Realising enterprise viewpoint concepts. In: Proceeding of the 4th International Enterprise Distributed Object Computing Conference, pp. 66–75. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  26. Twidle, K., Lupu, E.C.: Ponder2 - policy-based self managed cells. In: Bandara, A.K., Burgess, M. (eds.) AIMS 2007. LNCS, vol. 4543, p. 230. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  27. Pitrat, J.: Métaconnaissance, Futur de l’Intelligence Artificielle. Hermés (1990)

    Google Scholar 

  28. Thibadeau, R.: A critique of P3P: Privacy on web (2000), dollar.ecom.cmu.edu/p3pcritique/

  29. Castelfranchi, C.: Engineering social order. In: Omicini, A., Tolksdorf, R., Zambonelli, F. (eds.) ESAW 2000. LNCS, vol. 1972, pp. 1–18. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Crépin, L., Demazeau, Y., Boissier, O., Jacquenet, F. (2009). Sensitive Data Transaction in Hippocratic Multi-Agent Systems. In: Artikis, A., Picard, G., Vercouter, L. (eds) Engineering Societies in the Agents World IX. ESAW 2008. Lecture Notes in Computer Science(), vol 5485. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02562-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02562-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02561-7

  • Online ISBN: 978-3-642-02562-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics