Filters








183,507 Hits in 3.5 sec

Organized Anonymity in Agent Systems

Martijn Warnier, David de Groot, Frances M. T. Brazier
2006 European Workshop on Multi-Agent Systems  
Anonymity is of great importance in distributed agent applications such as e-commerce & auctions.  ...  This paper proposes and analyzes a new approach for organized anonymity of agents based on the use of pseudonyms.  ...  An organized solution for anonymity requires a solution that is integrated in the middleware of the agent system.  ... 
dblp:conf/eumas/WarnierGB06 fatcat:twlzx5afxfcgjndtrjh4oz4gg4

Organized Anonymous Agents

Martijn Warnier, Frances Bra
2007 Third International Symposium on Information Assurance and Security  
This paper proposes and analyzes a new approach for organized anonymity of agents based on the use of pseudonyms.  ...  Anonymity can be of great importance in distributed agent applications such as e-commerce & auctions.  ...  authors thank Stichting NLnet for their support, David de Groot and Benno Overeinder for their input and comments and 6 http://www.iids.org/access Reinier Timmer for the realization of the implementation in  ... 
doi:10.1109/ias.2007.34 dblp:conf/IEEEias/WarnierB07 fatcat:faqvzuixyzf5bharcz3rebsi4y

Organized Anonymous Agents

Martijn Warnier, Frances Brazier
2007 Third International Symposium on Information Assurance and Security  
This paper proposes and analyzes a new approach for organized anonymity of agents based on the use of pseudonyms.  ...  Anonymity can be of great importance in distributed agent applications such as e-commerce & auctions.  ...  authors thank Stichting NLnet for their support, David de Groot and Benno Overeinder for their input and comments and 6 http://www.iids.org/access Reinier Timmer for the realization of the implementation in  ... 
doi:10.1109/isias.2007.4299799 fatcat:qnanmuvrgngaflung6cwgng5pm

A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments [article]

Mehran Alidoost Nia, Aida Ghorbani, Reza Ebrahimi Atani
2014 arXiv   pre-print
The here is introduced scalability parameter in anonymous cloud architecture design space.  ...  In this paper we propose a novel and modified anonymous architecture that ensures customers that hide their identity from others.  ...  Cloud computing is widely common in framework of organization structures.  ... 
arXiv:1404.2261v1 fatcat:s7ia57v3snctnnfwujpcn5d74i

On the Economics of Anonymity [chapter]

Alessandro Acquisti, Roger Dingledine, Paul Syverson
2003 Lecture Notes in Computer Science  
Decentralized anonymity infrastructures are still not in wide use today.  ...  While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock.  ...  Thanks to John Bashinski, Nick Mathewson, Adam Shostack, Hal Varian, and the anonymous referees for helpful comments.  ... 
doi:10.1007/978-3-540-45126-6_7 fatcat:4pijnrcppbdhzhncidb3aiukwq

Security requirement analysis of business processes

Peter Herrmann, Gaby Herrmann
2006 Electronic Commerce Research  
This tool is based on object-oriented process models and acts with graph rewrite systems.  ...  Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems.  ...  Moreover, it refers to social aspects which are based on so-called anonymity groups. An anonymity group hides an anonymously acting agent in a group of other agents.  ... 
doi:10.1007/s10660-006-8677-7 fatcat:32vgzk2lt5db5alibtlg6ij2ri

A Multiagent System for Dynamic Data Aggregation in Medical Research

Alevtina Dubovitskaya, Visara Urovi, Imanol Barba, Karl Aberer, Michael Ignaz Schumacher
2016 BioMed Research International  
Our system employs principles of peer-to-peer network organization and coordination models to search over already constructed distributed databases and to identify the potential contributors when a new  ...  We use agent-based coordination between medical and research institutions.  ...  Acknowledgments This work was supported by the Nano-Tera initiative, in the framework of an RTD project ISyPeM2: developing therapeutic drug monitoring by designing a point-of-care system to measure drug  ... 
doi:10.1155/2016/9027457 pmid:27975063 pmcid:PMC5128729 fatcat:c4e6xob3ijfztghfmfkqetipu4

Anonymity services for multi-agent systems

Martijn Warnier, Frances Brazier
2010 Web Intelligence and Agent Systems  
Anonymity can be of great importance in distributed agent applications such as e-commerce & auctions.  ...  Performance measures for an anonymity service implemented for the AgentScape platform provides some insight in the overhead involved.  ...  We also thank the anonymous(!) reviewers for the valuable comments and suggestions to earlier drafts of this paper.  ... 
doi:10.3233/wia-2010-0188 fatcat:yfcnccqkbze5hbqdwdjezdnk7y

Anonymizing Web services through a club mechanism with economic incentives

M. Jenamani, L. Lilien, B. Bhargava
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
The lack of understanding of incentives for encouraging group cooperation is a major drawback in such systems.  ...  Preserving privacy during Web transactions is a major concern for individuals and organizations.  ...  Trust can be maintained in such systems by using shared and private histories of transactions.  ... 
doi:10.1109/icws.2004.1314823 dblp:conf/icws/JenamaniLB04 fatcat:f6ifvbn65fcojbjnt3ax6cpd5i

Prospects for remailers

Sameer Parekh
1996 First Monday  
Individual efforts have, so far, worked well in maintaining for most Internet users a modicum of anonymity.  ...  With the growth of increasingly sophisticated techniques to defeat anonymity, there will be a need for both standards and policies to continue to make privacy on the Internet a priority. 14.  ...  Second, a secure anonymous payment system must be incorporated into the network. In order for privacy to survive further commercialization of the Internet, it must be profitable.  ... 
doi:10.5210/fm.v1i2.476 fatcat:q2qjlsox7vdkhkkqz5bybzd2ye

Intelligent agents in support of internet security

Krystian Baniak
2007 Annales UMCS Informatica  
With this paper we try to show that autonomous intelligent agent based systems are able to support or even offload humans in bringing Internet Security to the next level.  ...  The related research is focused on analyzing network information flows, building knowledge base and applying reasoning techniques that would allow agents to track suspicious network activities, identify  ...  Intelligent Agent System consists of the following important elements: -Architecture: organization schema and roles and responsibilities of agents.  ... 
dblp:journals/umcs/Baniak07 fatcat:2ryhavsdgza3bnrrfbhxl3szq4

Identifying Materialized Privacy Claims of Clinical-Care Metadata Share Using Process-Mining and REA Ontology (regular paper)

Syeda Sohail, Faiza Allah Bukhsh, Maurice van Keulen, Johannes Krabbe
2021 International Workshop on Value Modeling and Business Ontologies  
The model discovers the key economic agents, their prime interactions (from contract signing to the exchange of resources) for mutual economic gain/loss in the care metadata share landscape.  ...  The Resource, Event, Agent (REA) ontology-based 'Insurance Model' is used to identify the underlying economic factors behind the un-anonymized patients' metadata share amongst caregivers.  ...  In this research work, the term 'un-anonymized metadata share' is used because the patients' identities are retractable in caregivers' ISs for an efficient clinical care system [22] .  ... 
dblp:conf/vmbo/SohailBKK21 fatcat:ssgfv46f25hdtlys3yce7ayofq

The quest for personal control over mobile location privacy

Qi He, Dapeng Wu, P. Khosla
2004 IEEE Communications Magazine  
To address this issue, we propose an authorized-anonymous-ID based scheme; this scheme effectively eliminates the need for a trusted server or administration, which is assumed in the previous work.  ...  ID collision should not be a serious problem in this case and can be prevented in many ways, for instance, by adding a time stamp.  ...  Based on this understanding, we can then design a system to protect location privacy. So we organize this section as below.  ... 
doi:10.1109/mcom.2004.1299356 fatcat:yvxs3tkdvzef3as6zt2nuyx2wq

Further Investigations on Methods Developed for Preserving Privacy of Computational Grids
english

R.S.VEN KATESH, P.K.REE JEESH, PROF.S.BALA MURUGAN, S.CHARA NYAA
2015 International Journal of Innovative Research in Computer and Communication Engineering  
of sensitive data, k-anonymization optimization algorithm ,seems to be promising and powerful in certain cases ,still carrying the restrictions that optimized k-anonymity are NP-hard, thereby leading  ...  This paper reviews methods developed for anonymizing data from 2001 to 2003 .  ...  In general, the users and resources in a Virtual Organization are controlled by the policies and standards formulated by classical organizations.  ... 
doi:10.15680/ijircce.2015.0301048 fatcat:z4e3sx5aejf6vpr53wthkfi27a

Page 618 of Journal of Law Economics & Organization Vol. 15, Issue 3 [page]

1999 Journal of Law Economics & Organization  
We find that while the enforceability of a business network depends on the reliability of the legal system, the existence of the network exerts a negative influence on the level of honesty in the anonymous  ...  The mechanism through which the personalized business network leads to inefficiency is the “cream skimming” of “good” types by the network that worsens the pool of agents remaining in the anonymous market  ... 
« Previous Showing results 1 — 15 out of 183,507 results