A vital requirement for e-commerce today is privacy. We explore the area of privacy for Agents in the Privacy Incorporated Software Agent (PISA) project. We first review existing privacy protection techniques: pseudonym systems, privacy enhancing technology (PET) and anonymous communication networks. We then propose a model for an Anonymous Internet Infrastructure (AII), an anonymous Internet based on PETAgents, and analyze several possible combinations both of network technologies and PET-Agents. Finally, we discuss the security interface issues for PISA-Agents and present a pseudonym E-commerce model based on PISA.De nos jours, une exigence vitale pour le commerce \ue9lectronique est la protection des renseignements personnels. Nous explo...
The emergence of the Internet of Things (IoT) has proved to be dangerous for the people's right to p...
Part 1: Invited PapersInternational audienceIn this paper we present our institute’s vision towards ...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
In recent years there has been a movement toward deployment of distributed approaches for electronic...
Internet users are becoming more concerned about their privacy. In addition, various governments (mo...
Privacy is of crucial importance in order for agent-based e-commerce applications to be of broad use...
Privacy is of crucial importance in order for agent-based e-commerce applications to be of broad use...
In this paper we apply privacy by design in e-commerce. We outline the requirements of a privacy-awa...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
As the Internet has advanced into a mass media technology that is easy to accessand use, its applica...
Internet and mobile communications have had a profound effect on today’s society. New services are c...
Anonymity can be of great importance in distributed agent applications such as e-commerce & auct...
The emergence of the Internet of Things (IoT) has proved to be dangerous for the people's right to p...
Part 1: Invited PapersInternational audienceIn this paper we present our institute’s vision towards ...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
In recent years there has been a movement toward deployment of distributed approaches for electronic...
Internet users are becoming more concerned about their privacy. In addition, various governments (mo...
Privacy is of crucial importance in order for agent-based e-commerce applications to be of broad use...
Privacy is of crucial importance in order for agent-based e-commerce applications to be of broad use...
In this paper we apply privacy by design in e-commerce. We outline the requirements of a privacy-awa...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
With the development of online communications in the past decades, new privacy concerns have emerged...
As the Internet has advanced into a mass media technology that is easy to accessand use, its applica...
Internet and mobile communications have had a profound effect on today’s society. New services are c...
Anonymity can be of great importance in distributed agent applications such as e-commerce & auct...
The emergence of the Internet of Things (IoT) has proved to be dangerous for the people's right to p...
Part 1: Invited PapersInternational audienceIn this paper we present our institute’s vision towards ...
The modern internet and phone networks offer very little security, privacy, or accountability to the...