Skip to main content

Designing for Privacy in a Multi-agent World

  • Conference paper
  • First Online:
Trust, Reputation, and Security: Theories and Practice (TRUST 2002)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2631))

Included in the following conference series:

Abstract

In a multi-agent world, privacy may have different meaning and significance for different agents. From a system design viewpoint, a practical approach to privacy should allow for a variety of perceptions and perspectives on privacy. Furthermore, privacy must be considered together with all the other requirements – functionality, usability, performance, costs, security, and so on. While there is a growing body of knowledge about privacy issues and how to address them through technical and non-technical means, systematic frameworks are needed to assist system analysts and designers in identifying, analyzing, and addressing these issues. In a networked, multi-agent environment, privacy concerns arise in the context of complex relationships among many human and automated agents. Each agent could have different viewpoints on what notions of privacy apply, and what mechanisms are appropriate for providing adequate privacy, in light of other competing or synergistic requirements. In this paper, we show how the i* framework can be used to model and reason about privacy requirements and solutions. Agents have privacy goals which are refined, then operationalized into implementable mechanisms, often through dependencies on other agents. To support early-stage design decisions, the impact of alternative solutions are assessed by propagating qualitative evaluations through a dependency network. A example in the health care domain is used to illustrate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Antón, A.I. and Earp., J.B. “A taxonomy for Web Site Privacy Requirements” NCSU Technical Report TR-2001-14, 18 December 2001.

    Google Scholar 

  2. Barber, K.S. and Kim, J. “Belief Revision Process Based on trust: Agents Evaluating Reputation of Information Sources” in Proc. Autonomous Agents’, Workshop on Deception, Fraud and Trust in Agent Societies, 2000 Barcelona.

    Google Scholar 

  3. Chung, L., Nixon, B., Yu, E. and Mylopoulos, J. “Non-Functional Requirements in Software Engineering” Kluwer Academic Publishers 2000.

    Google Scholar 

  4. Cysneiros, L.M., Leite, J.C.S.P. and Neto, J.S.M. “A Framework for Integrating Non-Functional Requirements into Conceptual Models” Requirements Engineering Journal — Vol 6, Issue 2 Apr. 2001, pp:97–115.

    Article  MATH  Google Scholar 

  5. Ebert, C. “Dealing with Nonfunctional in Large Software Systems”. Annals of Software Engineering, 3, 1997, pp. 367–395.

    Article  Google Scholar 

  6. Lanzola, G., Gatti, L., Falasconi, S., Stefanelli, M. “A Framework for Building Cooperative Software Agents in Medical Applications.” Artificial Intelligence in Medicine 16 (1999) pp:223–249

    Article  Google Scholar 

  7. Mylopoulos, J. Chung, L., Yu, E. and Nixon, B., “Representing and Using Non-functional Requirements: A Process-Oriented Approach”, IEEE Trans. on Software Eng, 18(6), pp:483–497, June 1992

    Article  Google Scholar 

  8. “Inventory of instruments and mechanisms contributing to the implementation and enforcement of the OCDE privacy guidelines on global networks” Head of Publications Services, OECD, 2 rue-André-Pascal, 75775 Paris Cedex 16, France.

    Google Scholar 

  9. Riva, A. et all “The Personal Internetworked Notary and Guardian” Internation Journal of Medical Informatics 62 (2001) pp:27–40.

    Article  Google Scholar 

  10. Szolovits, P., Doyle, J., Long, W.J. “Guardian Angel:Patient-Centered Health Information Systems” Technical Report MIT/LCS/TR-604, http://www.ga.org/ga/manifesto/GAtr.html

  11. Wallach, D.S., Appel, A.W. and Felten, E.W. “SAFKASI: A Security Mechanism for Language-Based Systems” ACM Transactions on Software Engineering and Methodology, volume 9, number 4, October 2000.

    Google Scholar 

  12. Wong, H.C. and Sycara, K. “Adding Security and Trust to Multi-Agent Systems” in Proc. Autonomous Agents’ 99, Workshop on Deception, Fraud and Trust in Agent Societies, 1999 Seattle pp:149–162

    Google Scholar 

  13. Yu, E. “Agent-Oriented Modelling: Software Versus the World” Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings. LNCS 2222.

    Google Scholar 

  14. Yu, E. and Liu, L. “Modelling Trust for System Design Using the i* Strategic Actors Framework” In: Trust in Cyber-Societies — Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer, 2001. pp.175–194.

    Google Scholar 

  15. Yu, E., Cysneiros. L.M., “Agent-Oriented Methodologies-Towards a Challenge Exemplar” in Proc of the 4th Intl. Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS 2002) Toronto May 2002.

    Google Scholar 

  16. Korba, L. “Privacy in Distributed Electronic Commerce” in Proc. of the 35th Hawaii Int. Conf. on System Science, Jan, 2002

    Google Scholar 

  17. HL7 SGML/XML Special Interest Group. http://www.mcis.duke.edu/standards/HL7/committees/sgml/index.html

  18. Poslad, S. and Calisti, M. “Towards Improved Trust and Security in FPA Agent Platforms” in Proc. Autonomous Agents’, Workshop on Deception, Fraud and Trust in Agent Societies, 2000 Barcelona pp: 87–90

    Google Scholar 

  19. Dan S. Wallach, Andrew W. Appel, Edward W. Felten ACM Transactions on Software Engineering and Methodology, volume 9, number 4, October 2000.

    Google Scholar 

  20. Wong, H.C. and Sycara, K. “Adding Security and Trust to Multi-Agent Systems” in Proc. Autonomous Agents’ 99, Workshop on Deception, Fraud and Trust in Agent Societies, 1999 Seattle pp:149–162

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, E., Cysneiros, L.M. (2003). Designing for Privacy in a Multi-agent World. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-36609-1_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00988-7

  • Online ISBN: 978-3-540-36609-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics