Skip to main content

Community Formation via a Distributed, Privacy-Protecting Matchmaking System

  • Chapter
  • First Online:
Book cover Community Computing and Support Systems

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1519))

Abstract

Shared interests often serve as the basis for the formation of community. Yet it is often difficult to find others on the net who share one’s interests, due to the large size of the network, the difficulty of finding newsgroups, mailing lists, and discussion groups that reflect possibly unusual interests, and because most people do not often post.

To address these issues, I have designed and am implementing Yenta, a system that safely and securely introduces people on the Internet who share some similar interests, and that enables the automatic formation of interest groups based on these shared interests. Yenta is a system of distributed, individual agents, each instantiation of which is run by an individual user. Each user’s Yenta discovers its user’s interests by direct examination of the user’s personal files. It then finds groups of similar users without divulging sensitive information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ackerman, Mark S., and Palen, Laysia, “The Zephyr Help Instance: Promoting Ongoing Activity in a CSCW System,” Proceedings of the Association of Computing Machinery’s Conference on Human Factors in Computing Systems (CHI’ 96), pp. 269–275, ACM Press, Vancouver, British Columbia, Canada, 1996.

    Google Scholar 

  2. Balkovich, E., Lerman, S. R., and Parmelee, R. P., “Computing in Higher Education: The Athena Experience,” Communications of the ACM, volume 28, issue 11, pp. 1214–1224, ACM, November, 1985.

    Article  Google Scholar 

  3. Chaum, David, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, volume 23 number 2, February, 1981.

    Google Scholar 

  4. Cornell, Gary and Horstmann, Cay, Core Java, SunSoft Press, 1996.

    Google Scholar 

  5. Crabtree, Barry, and Jennings, Nick, eds., Proceedings of the First International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agent Technology, The Practical Application Company, 1996.

    Google Scholar 

  6. Crowston, Keven and Malone, Thomas, “Intelligent Software Agents,” BYTE, pp. 267–271, December 1988.

    Google Scholar 

  7. Cupid Networks, Inc, http://www.yenta.email.com/.

  8. Dean, Drew, Felten, Edward W., and Wallach, Dan S., “Java Security: From HotJava to Netscape and Beyond,” Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 6–8, 1996.

    Google Scholar 

  9. Dellafera, C. A., Eichin, M. W., French, R. S., Jedlinksy, D. C., Kohl, J. T., and Sommerfeld, W. E., “The Zephyr Notification System,” Proceedings of the Winter 1988 Usenix Technical Conference, February 1988, pp. 213–219.

    Google Scholar 

  10. Demazeau, Y. and Müller, J. P., eds., Decentralized AI, Volumes 1, 2, and 3, North-Holland, 1991, 1992, and 1993.

    Google Scholar 

  11. Electric Classifieds, Inc, http://www.match.com/.

  12. Feldman, Paul, and Micali, Silvio, “Optimal Algorithms for Byzantine Agreement,” 20th STOC, pp. 148–161, ACM, New York, 1988.

    Google Scholar 

  13. Foner, Leonard N., “Clustering and Information Sharing in an Ecology of Cooperating Agents,” AAAI Spring Symposium on Information Gathering from Distributed, Heterogeneous Environments, Knoblock & Levy, eds., Stanford, CA, March, 1995.

    Google Scholar 

  14. Foner, Leonard, “Clustering and Information Sharing in an Ecology of Cooperating Agents, or How to Gossip without Spilling the Beans,” Proceedings of the Conference on Computers, Freedom, and Privacy’ 95 Student Paper Winner, Burlingame, CA, 1995.

    Google Scholar 

  15. Foner, Leonard N., “A Multi-Agent System for Matchmaking,” Proceedings of the First International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agent Technology, Barry Crabtree and Nick Jennings, eds., The Practical Application Company, 1996.

    Google Scholar 

  16. Foner, Leonard, “A Security Architecture for a Multi-Agent Matchmaker,” The First International Conference on Autonomous Agents’ 97, Marina del Rey, 1997.

    Google Scholar 

  17. Foner, Leonard N., “Entertaining Agents: A Sociological Case Study,” Proceedings of the First International Conference on Autonomous Agents, W. Lewis Johnson, ed. Also available as “Agents Memo 93-01”, http://foner.www.media.mit.edu/people/ foner/Julia/.

  18. Gosling, James, and McGilton, H., The Java Language Environment, Sun Microsystems, May 1995. http://java.sun.com/whitePaper/javawhitepaper_1.html

  19. Huberman, B.A., ed., The Ecology of Computation, North-Holland, 1988.

    Google Scholar 

  20. Ingemarsson, I., and Simmons, G. J., “A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party,” Advances in Cryptology—EUROCRYPT’ 90 Proceedings, pp. 266–282, Springer-Verlag, 1991.

    Google Scholar 

  21. International Traffic in Arms Regulations, 58 Federal Register 39,280 (1993) (to be codified at 22 C.F.R.§§120-128, 130).

    Google Scholar 

  22. Kautz, Henry, Milewski, Al, and Selman Bart, “Agent Amplified Communication,” AAAI’ 95 Spring Symposium Workshop Notes on Information Gathering in Distributed, Heterogeneous Environments, Stanford, CA.

    Google Scholar 

  23. Kaliski, Bert, “Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services,” RFC1424, February 10, 1993, ftp://ds.internic. net:/rfc/rfc1424.txt)

  24. Kuokka, Daniel, and Harada, Larry, “Matchmaking for Information Agents,” Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)’ 95, 1995.

    Google Scholar 

  25. Kuokka, Daniel and Harada, Larry, “On Using KQML for Matchmaking,” Proceedings of the First International Conference on Multiagent Systems, Victor Lesser, MIT Press, 1995.

    Google Scholar 

  26. Lashkari, Yezdi, Metral, Max, and Maes Pattie, “Collaborative Interface Agents,” Proceedings of the Twelfth National Conference on Artificial Intelligence, MIT Press, Cambridge, MA, 1994.

    Google Scholar 

  27. MacroView Communications Corp, http://www.sixdegrees.com/.

  28. Maxwell, Joseph A., Qualitative Research Design: An Interactive Approach (Applied Social Research Methods Series), Sage Publications, 1996.

    Google Scholar 

  29. McQuillan, J., “Software Checksumming in the IMP and Network Reliability,” RFC528, June 20, 1973, ftp://ds.internic.net/rfc/rfc528.txt

  30. Miles, Matthew B. and Huberman, A. Michael, Qualitative Data Analysis: An Expanded Sourcebook, SAGE Publications, Inc, Thousand Oaks, CA, 1994.

    Google Scholar 

  31. Murray, Janet, Hamlet on the Holodeck, The Free Press, Simon & Shuster, 1997.

    Google Scholar 

  32. Pease, Marshall, Shostak, Robert, Lamport, Leslie, “Reaching Agreement in the Presence of Faults,” Journal of the ACM 27/2, pp. 228–234, 1980.

    Google Scholar 

  33. Quist, Anton Braun, Excuse Me, What Was That? Confused Recollections of Things That Didn’t Go Exactly Right, Dilithium Press, 1982.

    Google Scholar 

  34. Sage Enterprises, Inc, http://www.planetall.com/.

  35. Shardanand, Upendra. Social Information Filtering for Music Recommendation, S.M. Thesis, Program in Media Arts and Sciences, 1994.

    Google Scholar 

  36. Shardanand, Upendra and Maes, Pattie, “Social Information Filtering: Algorithms for Automating’ Word of Mouth,’” Proceedings of CHI’95, ACM Press, 1995.

    Google Scholar 

  37. Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, second edition, John Wiley & Sons, 1996.

    Google Scholar 

  38. Thirunavukkarasu, Chelliah, Fini, Tom, and Mayfield, James, “Secret Agents—A Security Architecture for the KQML Agent Communication Language,” submitted to the CIKM’ 95 Intelligent Information Agents Workshop, Baltimore, MD, December 1995.

    Google Scholar 

  39. Turkle, Sherry, Life on the Screen: Identity in the Age of the Internet, Simon & Shuster, 1995.

    Google Scholar 

  40. Wolcott, Harry F., Writing Up Qualitative Research, SAGE Publications, Inc, Newbury Park, CA, 1990.

    Google Scholar 

  41. The Wall Street Journal, page B1, April 11, 1995.

    Google Scholar 

  42. Zimmermann, Philip, The Official PGP User’s Guide, MIT Press, 1995.

    Google Scholar 

  43. Zumoff, Joel, “Users Manual for the SMART Information Retrieval System,” Cornell Technical Report 71-95.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Foner, L.N. (1998). Community Formation via a Distributed, Privacy-Protecting Matchmaking System. In: Ishida, T. (eds) Community Computing and Support Systems. Lecture Notes in Computer Science, vol 1519. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49247-X_24

Download citation

  • DOI: https://doi.org/10.1007/3-540-49247-X_24

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65475-9

  • Online ISBN: 978-3-540-49247-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics