Abstract
In a multi-agent world, privacy may have different meaning and significance for different agents. From a system design viewpoint, a practical approach to privacy should allow for a variety of perceptions and perspectives on privacy. Furthermore, privacy must be considered together with all the other requirements – functionality, usability, performance, costs, security, and so on. While there is a growing body of knowledge about privacy issues and how to address them through technical and non-technical means, systematic frameworks are needed to assist system analysts and designers in identifying, analyzing, and addressing these issues. In a networked, multi-agent environment, privacy concerns arise in the context of complex relationships among many human and automated agents. Each agent could have different viewpoints on what notions of privacy apply, and what mechanisms are appropriate for providing adequate privacy, in light of other competing or synergistic requirements. In this paper, we show how the i* framework can be used to model and reason about privacy requirements and solutions. Agents have privacy goals which are refined, then operationalized into implementable mechanisms, often through dependencies on other agents. To support early-stage design decisions, the impact of alternative solutions are assessed by propagating qualitative evaluations through a dependency network. A example in the health care domain is used to illustrate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Antón, A.I. and Earp., J.B. “A taxonomy for Web Site Privacy Requirements” NCSU Technical Report TR-2001-14, 18 December 2001.
Barber, K.S. and Kim, J. “Belief Revision Process Based on trust: Agents Evaluating Reputation of Information Sources” in Proc. Autonomous Agents’, Workshop on Deception, Fraud and Trust in Agent Societies, 2000 Barcelona.
Chung, L., Nixon, B., Yu, E. and Mylopoulos, J. “Non-Functional Requirements in Software Engineering” Kluwer Academic Publishers 2000.
Cysneiros, L.M., Leite, J.C.S.P. and Neto, J.S.M. “A Framework for Integrating Non-Functional Requirements into Conceptual Models” Requirements Engineering Journal — Vol 6, Issue 2 Apr. 2001, pp:97–115.
Ebert, C. “Dealing with Nonfunctional in Large Software Systems”. Annals of Software Engineering, 3, 1997, pp. 367–395.
Lanzola, G., Gatti, L., Falasconi, S., Stefanelli, M. “A Framework for Building Cooperative Software Agents in Medical Applications.” Artificial Intelligence in Medicine 16 (1999) pp:223–249
Mylopoulos, J. Chung, L., Yu, E. and Nixon, B., “Representing and Using Non-functional Requirements: A Process-Oriented Approach”, IEEE Trans. on Software Eng, 18(6), pp:483–497, June 1992
“Inventory of instruments and mechanisms contributing to the implementation and enforcement of the OCDE privacy guidelines on global networks” Head of Publications Services, OECD, 2 rue-André-Pascal, 75775 Paris Cedex 16, France.
Riva, A. et all “The Personal Internetworked Notary and Guardian” Internation Journal of Medical Informatics 62 (2001) pp:27–40.
Szolovits, P., Doyle, J., Long, W.J. “Guardian Angel:Patient-Centered Health Information Systems” Technical Report MIT/LCS/TR-604, http://www.ga.org/ga/manifesto/GAtr.html
Wallach, D.S., Appel, A.W. and Felten, E.W. “SAFKASI: A Security Mechanism for Language-Based Systems” ACM Transactions on Software Engineering and Methodology, volume 9, number 4, October 2000.
Wong, H.C. and Sycara, K. “Adding Security and Trust to Multi-Agent Systems” in Proc. Autonomous Agents’ 99, Workshop on Deception, Fraud and Trust in Agent Societies, 1999 Seattle pp:149–162
Yu, E. “Agent-Oriented Modelling: Software Versus the World” Agent-Oriented Software Engineering AOSE-2001 Workshop Proceedings. LNCS 2222.
Yu, E. and Liu, L. “Modelling Trust for System Design Using the i* Strategic Actors Framework” In: Trust in Cyber-Societies — Integrating the Human and Artificial Perspectives. R. Falcone, M. Singh, Y.H. Tan, eds. LNAI-2246. Springer, 2001. pp.175–194.
Yu, E., Cysneiros. L.M., “Agent-Oriented Methodologies-Towards a Challenge Exemplar” in Proc of the 4th Intl. Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS 2002) Toronto May 2002.
Korba, L. “Privacy in Distributed Electronic Commerce” in Proc. of the 35th Hawaii Int. Conf. on System Science, Jan, 2002
HL7 SGML/XML Special Interest Group. http://www.mcis.duke.edu/standards/HL7/committees/sgml/index.html
Poslad, S. and Calisti, M. “Towards Improved Trust and Security in FPA Agent Platforms” in Proc. Autonomous Agents’, Workshop on Deception, Fraud and Trust in Agent Societies, 2000 Barcelona pp: 87–90
Dan S. Wallach, Andrew W. Appel, Edward W. Felten ACM Transactions on Software Engineering and Methodology, volume 9, number 4, October 2000.
Wong, H.C. and Sycara, K. “Adding Security and Trust to Multi-Agent Systems” in Proc. Autonomous Agents’ 99, Workshop on Deception, Fraud and Trust in Agent Societies, 1999 Seattle pp:149–162
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, E., Cysneiros, L.M. (2003). Designing for Privacy in a Multi-agent World. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_16
Download citation
DOI: https://doi.org/10.1007/3-540-36609-1_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00988-7
Online ISBN: 978-3-540-36609-6
eBook Packages: Springer Book Archive