Abstract
Privacy infringements when companies gather customer information are more likely to occur if the customer lacks control over this process. In this paper, a method is described for user self-profiling when engaged in e-commerce over the Internet, by which customers can have greater control over profiles relating to their behaviour or preferences and can exploit this information in a flexible way without revealing their identity. This is achieved using trusted agents that exploit Trusted Computing Platform technology [28].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
O. Andy. Peer-to-Peer, Harnessing the Power of Disruptive Technology, O’Reilly, 2001.
G. Bahadur, W. Chan and C. Weber, Privacy Defended, p45, Que, 2002.
B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler, “How can you trust a Computing Platform?” Proceedings of ISSE 2000, Barcelona, Spain, 27–29 September 2000.
S. Brands, “A Semi-Technical Overview of Digital Credentials”, International Journal on Information Security, August 2002. Available via http://www.credentica.com
L. Bygrave, “Electronic Agents and Privacy: A Cyberspace Odyssey 2001”, International Journal of Law and Information Technology, vol 9, no 3, p. 280, OUP, 2001.
Applied Artificial Intelligence, Special Issue on “Trust in Agents”, C. Castelfranchi, R. Falcone, B. Firozabadi and Y. Tan (editors), Taylor and Francis, vol 14, no 8, p.765, 2000.
Castelfranchi, C. and Y.-H. Tan, eds., Trust and Deception in Virtual Societies, Kluwer, 2001.
D. Chaum, “Achieving Electronic Privacy”, Scientific American, p. 96–101, August 1992.
H. Chi Wong and K. Sycara, “Adding Security and Trust to Multiagent Systems”, Applied Artificial Intelligence, Special Issue on “Trust in Agents”, C. Castelfranchi, R. Falcone, B. Firozabadi and Y. Tan (editors), Taylor and Francis, vol 14, no 9, p. 927–941, 2000.
M. Enzmann, T. Kunz and M. Schneider, “A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping”, G. Davida, Y. Frankel and O. Rees (eds.), InfraSec 2002, LNCS 2437, p. 199–213, Springer-Verlag, 2002.
D. Grritzalis and N. Kyrloglou, “Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes”, Proceedings of SCCC 2001, p. 115–123, IEEE Comput. Soc., 2001.
B. Huberman and T. Hogg, “Protecting Privacy while Revealing Data”, Nature Biotech, vol 20, p. 332, 2002.
L. Korba, “Privacy in Distributed Electronic Commerce”, Proceedings of the 35th Hawaii International Conference on System Sciences, IEEE, 2002.
Liberty Alliance, Liberty Alliance Project, http://www.projectliberty.org
Y. Mass and O. Shehory, “Distributed Trust in Open Multi-agent Systems”, Trust in Cybersocieties, R. Falcone, M. Singh and Y. Tan (eds.), LNAI 2246, p. 159–173, Springer, 2001.
Microsoft Corporation, Building User-Centric Experiences: An Introduction to Microsoft.NET My Services, Sept 2001. Available via http://www.microsoft.com/net/myservices.asp
T. Nabeth and C. Roda, “Intelligent Agents and the Future of Identity”, IPTS Report, no. 67, September 2002. Available via http://www.jrc.es/]
N. Negroponte. Being Digital, p. 155, Hodder & Stoughton, London, 1995.
J. Neilson, “Noncommand User Interfaces”, Com. of ACM, vol 36, no 4, p. 83–99, April 1993.
S. Pearson (ed.), Trusted Computing Platforms, Prentice Hall, 2002.
S. Riche, G. Brebner and M. Gittler, “Client-Side Profile Storage”, Proceedings of International Workshop on Web Engineering, Pisa, Italy, May 25th 2002.
B. Schneier, Applied Cryptography. New York: John Wiley & Sons, 2nd edition, 1996.
K. Scribben. “Privacy@net — An International comparative study of consumer privacy on the Internet”, Consumers International, January 2001. (ISBN: 19023 913168).
A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity”, Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, 14 — 15 April, 2002.
B. Shneiderman, “Designing Trust into Online Experiences”, ACM, Special Issue on “Trusting Technology”, Communications of the ACM, vol 43, no 12, p..57–59, December 2000.
A. Tabachnick and L. Fidell, Using Multivariate Statistics, 4th ed, pub. Allyn & Bacon, 2000.
Trusted Computing Platform Alliance, Building A Foundation of Trust in the PC, White Paper, January 2000. Available via http://www.trustedcomputing.org
Trusted Computing Platform Alliance, TCPA Main Specification, Version 1.1, 2001. Available via http://www.trustedcomputing.org
J. D. Tygar “Atomicity in electronic commerce”, Proc. 15th Annual ACM Symposium on Principles of Distributed Computing, Philadelphia, USA, May 1996, p. 8–26, New York, 1996.
World Wide Web Consortium, Platform for Privacy Preferences Specification 1.0. http://www.w3.org/TR/P3P/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pearson, S. (2003). A Trusted Method for Self-profiling in e-Commerce. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_14
Download citation
DOI: https://doi.org/10.1007/3-540-36609-1_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00988-7
Online ISBN: 978-3-540-36609-6
eBook Packages: Springer Book Archive