Abstract
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive information about users or groups of users. A typical problem in this context concerns the disclosure of confidential identity data. To tackle this difficulty, we consider in this paper the context of Hippocratic Multi-Agent Systems (HiMAS), a model designed for the privacy management. In this context, we propose a common content language combining meta-policies and application context data on one hand and on the other hand an interaction protocol for the exchange of sensitive data. Based on this proposal, agents providing sensitive data are able to check the compliance of the consumers to the HiMAS principles. The protocol that we propose is validated on a distributed calendar management application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Crépin, L., Vercouter, L., Jaquenet, F., Demazeau, Y., Boissier, O.: Hippocratic multi-agent systems. In: Proceedings of the 10th International Conference of Entreprise Information Systems, pp. 301–308 (2008)
W3C: Plateform for privacy preferences (2002), http://www.w3.org/p3p/
Cranor, L.F.: Web Privacy with P3P. O’Reilly, Sebastopol (2002)
Demazeau, Y., Melaye, D., Verrons, M.-H.: A decentralized calendar system featuring sharing, trusting and negotiating. In: Ali, M., Dapoigny, R. (eds.) IEA/AIE 2006. LNCS, vol. 4031, pp. 731–740. Springer, Heidelberg (2006)
Thomson, J.J.: The right of privacy. Philosophy and Public Affairs 4, 295–314 (1975)
Demeulenaere, P.: Difficulties of private life characterization from a sociologic point of view. In: Privacy in Information Society, vol. 11 (2002)
Baase, S.: A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Prentice-Hall, Englewood Cliffs (2003)
Westin, A.F.: Special report: legal safeguards to insure privacy in a computer society. Commun. ACM 10(9), 533–537 (1967)
Warren, S.D., Brandeis, L.D.: The right to privacy. Wadsworth Publ. Co., Belmont (1985)
Lessig, L.: Code and Other Laws of Cyberspace. Basic Books, New York (2000)
Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the European Conference on Computer Supported Cooperative Work (ECSCW), pp. 77–92. Kluwer Academic Publishers, Dordrecht (1993)
Palen, L., Dourish, P.: Unpacking ”privacy” for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York (2003)
Rezgui, A., Ouzzani, M., Bouguettaya, A., Medjahed, B.: Preserving privacy in web services. In: Chiang, R.H.L., Lim, E.P. (eds.) Proceedings of the Workshop on Web Information and Data Management, pp. 56–62. ACM, New York (2002)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the International Conference Very Large Data Bases, pp. 143–154. Morgan Kaufmann, San Francisco (2002)
Bratman, M.E.: Intention, plans, and practical reason. O’Reilly, Harvard University Press, Cambridge (1987)
Sichman, J.S., Demazeau, Y.: Exploiting social reasoning to deal with agency level inconsistency. In: Proceedings of the First International Conference on Multiagent Systems, pp. 352–359. MIT Press, Cambridge (1995)
Sowa, J.F.: Conceptual Structures: Information Processing in Mind and Machine. Addison-Wesley, Reading (1984)
W3C: Owl web ontology language (2004), http://www.w3.org/tr/owl-features/
Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: P2P-based collaborative spam detection and filtering. In: Proceedings of 4th International Conference on Peer-to-Peer Computing, pp. 176–183. IEEE Computer Society, Los Alamitos (2004)
FIPA: Fipa communicative act library specification (2002), http://www.fipa.org/specs/fipa00037/index.html
Esteva, M., de la Cruz, D., Sierra, C.: Islander: an electronic institutions editor. In: Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, pp. 1045–1052. ACM, New York (2002)
Hosmer, H.H.: Metapolicies I. ACM SIGSAC Data Management Workshop 10(2-3), 18–43 (1991)
Hosmer, H.H.: Metapolicies II. In: Proceeding of the 15th National Computer Security Conference, pp. 369–378. Elsevier Advanced Technology Publications, Amsterdam (1992)
Kühnhauser, W.E.: A paradigm for user-defined security policies. In: Symposium on Reliable Distributed Systems, pp. 135–144 (1995)
Lupu, E., Sloman, M., Dulay, N., Damianou, N.: Ponder: Realising enterprise viewpoint concepts. In: Proceeding of the 4th International Enterprise Distributed Object Computing Conference, pp. 66–75. IEEE Computer Society, Los Alamitos (2000)
Twidle, K., Lupu, E.C.: Ponder2 - policy-based self managed cells. In: Bandara, A.K., Burgess, M. (eds.) AIMS 2007. LNCS, vol. 4543, p. 230. Springer, Heidelberg (2007)
Pitrat, J.: Métaconnaissance, Futur de l’Intelligence Artificielle. Hermés (1990)
Thibadeau, R.: A critique of P3P: Privacy on web (2000), dollar.ecom.cmu.edu/p3pcritique/
Castelfranchi, C.: Engineering social order. In: Omicini, A., Tolksdorf, R., Zambonelli, F. (eds.) ESAW 2000. LNCS, vol. 1972, pp. 1–18. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Crépin, L., Demazeau, Y., Boissier, O., Jacquenet, F. (2009). Sensitive Data Transaction in Hippocratic Multi-Agent Systems. In: Artikis, A., Picard, G., Vercouter, L. (eds) Engineering Societies in the Agents World IX. ESAW 2008. Lecture Notes in Computer Science(), vol 5485. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02562-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-02562-4_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02561-7
Online ISBN: 978-3-642-02562-4
eBook Packages: Computer ScienceComputer Science (R0)