{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:09:29Z","timestamp":1743080969629,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272158"},{"type":"electronic","value":"9783642272165"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27216-5_31","type":"book-chapter","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T02:56:19Z","timestamp":1326164179000},"page":"411-425","source":"Crossref","is-referenced-by-count":1,"title":["An Agent Infrastructure for Privacy-Enhancing Agent-Based E-commerce Applications"],"prefix":"10.1007","author":[{"given":"Jose M.","family":"Such","sequence":"first","affiliation":[]},{"given":"Agustin","family":"Espinosa","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Garcia-Fornes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"A\u00efmeur, E., Brassard, G., Onana, F.S.M.: Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS International Conference on e-Commerce, pp. 25\u201333 (2005)"},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10462-010-9167-9","volume":"34","author":"J.M. Alberola","year":"2010","unstructured":"Alberola, J.M., Such, J.M., Garcia-Fornes, A., Espinosa, A., Botti, V.: A performance evaluation of three multiagent platforms. Artificial Intelligence Review\u00a034, 145\u2013176 (2010)","journal-title":"Artificial Intelligence Review"},{"key":"31_CR3","unstructured":"Balke, T., Eymann, T.: The conclusion of contracts by software agents in the eyes of the law. In: Proc. of The 7th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2008), pp. 771\u2013778 (2008)"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"493","DOI":"10.3233\/JCS-2007-15502","volume":"15","author":"A. Bhargav-Spantzel","year":"2007","unstructured":"Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: A taxonomy and open issues. J. Comput. Secur.\u00a015, 493\u2013527 (2007)","journal-title":"J. Comput. Secur."},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Bordini, R.H., Wooldridge, M., H\u00fcbner, J.F.: Programming Multi-Agent Systems in AgentSpeak using Jason (Wiley Series in Agent Technology). John Wiley & Sons (2007)","DOI":"10.1002\/9780470061848"},{"key":"31_CR6","unstructured":"Carrara, E., Hogben, G.: Reputation-based systems: a security analysis. ENISA Position Paper (2007)"},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM\u00a028, 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"31_CR9","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/1102486.1102501","volume-title":"DIM 2005: Proceedings of the 2005 Workshop on Digital Identity Management","author":"S. Clau\u03b2","year":"2005","unstructured":"Clau\u03b2, S., Kesdogan, D., K\u00f6lsch, T.: Privacy enhancing identity management: protection against re-identification and profiling. In: DIM 2005: Proceedings of the 2005 Workshop on Digital Identity Management, pp. 84\u201393. ACM, New York (2005)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The tls protocol version 1.0. RFC 2246 (1999), http:\/\/www.ietf.org\/rfc\/rfc2246.txt","DOI":"10.17487\/rfc2246"},{"key":"31_CR11","unstructured":"Fasli, M.: Agent Technology For E-Commerce. John Wiley & Sons (2007)"},{"issue":"1","key":"31_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1017\/S0269888907001014","volume":"22","author":"M. Fasli","year":"2007","unstructured":"Fasli, M.: On agent technology for e-commerce: trust, security and legal issues. Knowledge Engineering Review\u00a022(1), 3\u201335 (2007)","journal-title":"Knowledge Engineering Review"},{"key":"31_CR13","unstructured":"FIPA: FIPA ACL Message Structure Specification. FIPA (2001), http:\/\/www.fipa.org\/specs\/fipa00061\/"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/105864001300122476","volume":"10","author":"E.J. Friedman","year":"1998","unstructured":"Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy\u00a010, 173\u2013199 (1998)","journal-title":"Journal of Economics and Management Strategy"},{"key":"31_CR15","unstructured":"Frier, A., Karlton, P., Kocher, P.: The secure socket layer. Tech. Rep. MSU-CSE-00-2, Netscape Communications (1996)"},{"key":"31_CR16","unstructured":"Garfinkel, S.: Privacy requires security, not abstinence: Protecting an inalienable right in the age of facebook (2009), http:\/\/www.technologyreview.com\/computing\/22831\/"},{"issue":"4","key":"31_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/299157.299175","volume":"42","author":"D. Hoffman","year":"1999","unstructured":"Hoffman, D., Novak, T., Peralta, M.: Building consumer trust online. Communications of the ACM\u00a042(4), 80\u201385 (1999)","journal-title":"Communications of the ACM"},{"key":"31_CR18","unstructured":"JADE Board: Jade security guide (2005), http:\/\/jade.tilab.com"},{"key":"31_CR19","unstructured":"J\u00f8sang, A., Golbeck, J.: Challenges for Robust Trust and Reputation Systems. In: Proceedings of the 5th International Workshop on Security and Trust Management, STM 2009 (2009)"},{"key":"31_CR20","unstructured":"Kerr, R., Cohen, R.: Smart cheaters do prosper: defeating trust and reputation systems. In: Proc. of The 8th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2009), pp. 993\u20131000 (2009)"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Neuman, C., Yu, T., Hartman, S., Raeburn, K.: The Kerberos Network Authentication Service (V5). No. 4120 in Request for Comments, IETF (2005)","DOI":"10.17487\/rfc4120"},{"key":"31_CR22","unstructured":"Newman, A.E.: Cougaar developers\u2019 guide (2004), http:\/\/www.cougaar.org"},{"key":"31_CR23","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34 (August 2010), http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Quillinan, T.B., Warnier, M., Oey, M., Timmer, R., Brazier, F.: Enforcing security in the agentscape middleware. In: Proceedings of the 2008 Workshop on Middleware Security, MidSec 2008, pp. 25\u201330. ACM (2008)","DOI":"10.1145\/1463342.1463347"},{"issue":"1","key":"31_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S. Ramchurn","year":"2004","unstructured":"Ramchurn, S., Huynh, D., Jennings, N.: Trust in multi-agent systems. The Knowledge Engineering Review\u00a019(1), 1\u201325 (2004)","journal-title":"The Knowledge Engineering Review"},{"volume-title":"The Future of Identity in the Information Society: Challenges and Opportunities","year":"2009","key":"31_CR26","unstructured":"Rannenberg, K., Royer, D., Deuker, A. (eds.): The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Heidelberg (2009) Incorporated"},{"key":"31_CR27","unstructured":"Recursion Software Inc.: Voyager security guide (2008), http:\/\/www.recursionsw.com\/"},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"Roth, V., Jalali-Sohi, M.: Concepts and architecture of a security-centric mobile agent server. In: ISADS (2001)","DOI":"10.1109\/ISADS.2001.917449"},{"key":"31_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review\u00a024, 33\u201360 (2005)","journal-title":"Artificial Intelligence Review"},{"issue":"1","key":"31_CR30","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering\u00a035(1), 67\u201382 (2009)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"Stamp, M.: Information Security: Principles and Practice. Wiley-Interscience (2006)","DOI":"10.1002\/0471744190"},{"key":"31_CR32","unstructured":"Such, J.M., Alberola, J.M., Espinosa, A., Garcia-Fornes, A.: A group-oriented secure multiagent platform. Software: Practice and Experience (in Press, 2011a)"},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"Such, J.M., Espinosa, A., Garcia-Fornes, A., Botti, V.: Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence (in Press, 2011b)","DOI":"10.1016\/j.engappai.2011.06.008"},{"key":"31_CR34","doi-asserted-by":"crossref","unstructured":"Ugurlu, S., Erdogan, N.: An overview of secmap secure mobile agent platform. In: Proceedings of Second International Workshop on Safety and Security in Multiagent Systems (2005)","DOI":"10.1007\/11559221_11"},{"issue":"6","key":"31_CR35","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIC.2006.116","volume":"10","author":"S. Vinoski","year":"2006","unstructured":"Vinoski, S.: Advanced message queuing protocol. IEEE Internet Computing\u00a010(6), 87\u201389 (2006)","journal-title":"IEEE Internet Computing"},{"issue":"2","key":"31_CR36","doi-asserted-by":"crossref","first-page":"219","DOI":"10.3233\/WIA-2010-0188","volume":"8","author":"M. Warnier","year":"2010","unstructured":"Warnier, M., Brazier, F.: Anonymity services for multi-agent systems. Web Intelligence and Agent Systems\u00a08(2), 219\u2013232 (2010)","journal-title":"Web Intelligence and Agent Systems"},{"issue":"2","key":"31_CR37","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1111\/1540-4560.00072","volume":"59","author":"A. Westin","year":"2003","unstructured":"Westin, A.: Social and political dimensions of privacy. Journal of Social Issues\u00a059(2), 431\u2013453 (2003)","journal-title":"Journal of Social Issues"},{"key":"31_CR38","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1023\/A:1025859021913","volume":"10","author":"H. Xu","year":"2003","unstructured":"Xu, H., Shatz, S.M.: Adk: An agent development kit based on a formal design model for multi-agent systems. Journal of Automated Software Engineering\u00a010, 337\u2013365 (2003)","journal-title":"Journal of Automated Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Advanced Agent Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27216-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,25]],"date-time":"2021-12-25T15:16:02Z","timestamp":1640445362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27216-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642272158","9783642272165"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27216-5_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}