Privacy protection in trust models for agent societies

Repositorio e-Archivo

Mostrar el registro sencillo del ítem

dc.contributor.author Carbo Rubiera, Javier Ignacio
dc.contributor.author Pedraza Córdoba, Juanita del Pilar
dc.contributor.author López, Mar
dc.contributor.author Molina López, José Manuel
dc.date.accessioned 2018-03-23T16:26:47Z
dc.date.available 2018-03-23T16:26:47Z
dc.date.issued 2014
dc.identifier.bibliographicCitation Gaviria de la Puerta, José,... et al.(2014) International Joint Conference SOCO'14-CISIS'14-ICEUTE'14: Bilbao, Spain, June 25th-27th, 2014, proceedings. (Advances in Intelligent Systems and Computing, 299). Berlín: Springer. Pp. 135-144.
dc.identifier.isbn 978-3-319-07994-3 (Print)
dc.identifier.isbn 978-3-319-07995-0 (Online)
dc.identifier.issn 2194-5357 (Print)
dc.identifier.issn 2194-5365 (Online)
dc.identifier.uri http://hdl.handle.net/10016/26567
dc.description Proceeding of: International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, Bilbao, Spain, June 25th–27th, 2014
dc.description.abstract In this paper we have motivated the use of privacy-protection measures in trust models, both in conscious exchanges of opinions and in an unconscious way when security attacks take place. Most of the privacy dimensions are concerned into trust communications. In particular we define the privacy rights that these trusting communications must legally be guaranteed. From them, we describe additional message exchanges that, acting as control mechanisms, would be required to exercise such rights. Furthermore, we also enumerated the corresponding privacy violations that would have taken place if these control mechanisms were ignored. From the possible existence of privacy violations, regulatory structures may establish what agents are allowed and forbidden to do according to the legal privacy rights. We have applied the control mechanisms as additional message exchanges to a particular application domain (the Agent Trust and Reputation testbed) implemented as JADE interaction protocols, and finally we plan to define an Electronic Institution that would rule the corresponding norms and violations to such control using the Islander specification tool.
dc.description.sponsorship This work was supported in part by Projects MINECO TEC2012-37832-C02-01, CICYT TEC2011-28626-C02-02, CAM CONTEXTS (S2009/TIC-1485)
dc.format.extent 9
dc.format.mimetype application/pdf
dc.language.iso eng
dc.publisher Springer
dc.relation.ispartofseries Advances in Intelligent Systems and Computing
dc.relation.ispartofseries 299
dc.rights © Springer International Publishing Switzerland 2014
dc.subject.other Data protection
dc.subject.other Data security
dc.subject.other Privacy
dc.subject.other Procolos
dc.subject.other Intelligent agents
dc.subject.other Trust models
dc.title Privacy protection in trust models for agent societies
dc.type bookPart
dc.type conferenceObject
dc.subject.eciencia Informática
dc.rights.accessRights openAccess
dc.relation.projectID Gobierno de España. TEC2012-37832-C02-01
dc.relation.projectID Gobierno de España. TEC2011-28626-C02-02
dc.relation.projectID Comunidad de Madrid. CONTEXTS (S2009/TIC-1485)
dc.type.version acceptedVersion
dc.relation.eventdate June 25th-27th, 2014
dc.relation.eventnumber 9
dc.relation.eventplace Bilbao, España
dc.relation.eventtitle International Joint Conference SOCO'14-CISIS'14-ICEUTE'14
dc.relation.eventtitle 9th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2014)
dc.relation.eventtype proceeding
dc.identifier.publicationfirstpage 135
dc.identifier.publicationlastpage 144
dc.identifier.publicationtitle International Joint Conference SOCO'14-CISIS'14-ICEUTE'14. Bilbao, Spain, June 25th-27th, 2014, proceedings
dc.identifier.uxxi CC/0000022986
 Find Full text

Ficheros en el ítem

*Click en la imagen del fichero para previsualizar.(Los elementos embargados carecen de esta funcionalidad)


Este ítem aparece en la(s) siguiente(s) colección(es)

Mostrar el registro sencillo del ítem