Skip to main content

A Trusted Method for Self-profiling in e-Commerce

  • Conference paper
  • First Online:
Trust, Reputation, and Security: Theories and Practice (TRUST 2002)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2631))

Included in the following conference series:

Abstract

Privacy infringements when companies gather customer information are more likely to occur if the customer lacks control over this process. In this paper, a method is described for user self-profiling when engaged in e-commerce over the Internet, by which customers can have greater control over profiles relating to their behaviour or preferences and can exploit this information in a flexible way without revealing their identity. This is achieved using trusted agents that exploit Trusted Computing Platform technology [28].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. O. Andy. Peer-to-Peer, Harnessing the Power of Disruptive Technology, O’Reilly, 2001.

    Google Scholar 

  2. G. Bahadur, W. Chan and C. Weber, Privacy Defended, p45, Que, 2002.

    Google Scholar 

  3. B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler, “How can you trust a Computing Platform?” Proceedings of ISSE 2000, Barcelona, Spain, 27–29 September 2000.

    Google Scholar 

  4. S. Brands, “A Semi-Technical Overview of Digital Credentials”, International Journal on Information Security, August 2002. Available via http://www.credentica.com

  5. L. Bygrave, “Electronic Agents and Privacy: A Cyberspace Odyssey 2001”, International Journal of Law and Information Technology, vol 9, no 3, p. 280, OUP, 2001.

    Article  Google Scholar 

  6. Applied Artificial Intelligence, Special Issue on “Trust in Agents”, C. Castelfranchi, R. Falcone, B. Firozabadi and Y. Tan (editors), Taylor and Francis, vol 14, no 8, p.765, 2000.

    Google Scholar 

  7. Castelfranchi, C. and Y.-H. Tan, eds., Trust and Deception in Virtual Societies, Kluwer, 2001.

    Google Scholar 

  8. D. Chaum, “Achieving Electronic Privacy”, Scientific American, p. 96–101, August 1992.

    Google Scholar 

  9. H. Chi Wong and K. Sycara, “Adding Security and Trust to Multiagent Systems”, Applied Artificial Intelligence, Special Issue on “Trust in Agents”, C. Castelfranchi, R. Falcone, B. Firozabadi and Y. Tan (editors), Taylor and Francis, vol 14, no 9, p. 927–941, 2000.

    Google Scholar 

  10. M. Enzmann, T. Kunz and M. Schneider, “A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping”, G. Davida, Y. Frankel and O. Rees (eds.), InfraSec 2002, LNCS 2437, p. 199–213, Springer-Verlag, 2002.

    Google Scholar 

  11. D. Grritzalis and N. Kyrloglou, “Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes”, Proceedings of SCCC 2001, p. 115–123, IEEE Comput. Soc., 2001.

    Google Scholar 

  12. B. Huberman and T. Hogg, “Protecting Privacy while Revealing Data”, Nature Biotech, vol 20, p. 332, 2002.

    Article  Google Scholar 

  13. L. Korba, “Privacy in Distributed Electronic Commerce”, Proceedings of the 35th Hawaii International Conference on System Sciences, IEEE, 2002.

    Google Scholar 

  14. Liberty Alliance, Liberty Alliance Project, http://www.projectliberty.org

  15. Y. Mass and O. Shehory, “Distributed Trust in Open Multi-agent Systems”, Trust in Cybersocieties, R. Falcone, M. Singh and Y. Tan (eds.), LNAI 2246, p. 159–173, Springer, 2001.

    Google Scholar 

  16. Microsoft Corporation, Building User-Centric Experiences: An Introduction to Microsoft.NET My Services, Sept 2001. Available via http://www.microsoft.com/net/myservices.asp

  17. T. Nabeth and C. Roda, “Intelligent Agents and the Future of Identity”, IPTS Report, no. 67, September 2002. Available via http://www.jrc.es/]

  18. N. Negroponte. Being Digital, p. 155, Hodder & Stoughton, London, 1995.

    Google Scholar 

  19. J. Neilson, “Noncommand User Interfaces”, Com. of ACM, vol 36, no 4, p. 83–99, April 1993.

    Article  Google Scholar 

  20. S. Pearson (ed.), Trusted Computing Platforms, Prentice Hall, 2002.

    Google Scholar 

  21. S. Riche, G. Brebner and M. Gittler, “Client-Side Profile Storage”, Proceedings of International Workshop on Web Engineering, Pisa, Italy, May 25th 2002.

    Google Scholar 

  22. B. Schneier, Applied Cryptography. New York: John Wiley & Sons, 2nd edition, 1996.

    Google Scholar 

  23. K. Scribben. “Privacy@net — An International comparative study of consumer privacy on the Internet”, Consumers International, January 2001. (ISBN: 19023 913168).

    Google Scholar 

  24. A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity”, Workshop on Privacy Enhancing Technologies, San Francisco, CA, USA, 14 — 15 April, 2002.

    Google Scholar 

  25. B. Shneiderman, “Designing Trust into Online Experiences”, ACM, Special Issue on “Trusting Technology”, Communications of the ACM, vol 43, no 12, p..57–59, December 2000.

    Google Scholar 

  26. A. Tabachnick and L. Fidell, Using Multivariate Statistics, 4th ed, pub. Allyn & Bacon, 2000.

    Google Scholar 

  27. Trusted Computing Platform Alliance, Building A Foundation of Trust in the PC, White Paper, January 2000. Available via http://www.trustedcomputing.org

  28. Trusted Computing Platform Alliance, TCPA Main Specification, Version 1.1, 2001. Available via http://www.trustedcomputing.org

  29. J. D. Tygar “Atomicity in electronic commerce”, Proc. 15th Annual ACM Symposium on Principles of Distributed Computing, Philadelphia, USA, May 1996, p. 8–26, New York, 1996.

    Google Scholar 

  30. World Wide Web Consortium, Platform for Privacy Preferences Specification 1.0. http://www.w3.org/TR/P3P/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pearson, S. (2003). A Trusted Method for Self-profiling in e-Commerce. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, Reputation, and Security: Theories and Practice. TRUST 2002. Lecture Notes in Computer Science, vol 2631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36609-1_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-36609-1_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00988-7

  • Online ISBN: 978-3-540-36609-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics