Privacy in Distributed Electronic Commerce
نویسنده
چکیده
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act on behalf of human users in electronic transactions. A challenge with this approach is that the agents would be entrusted with access to sensitive personal or business information. How can this sensitive information be protected from unauthorized access? How can agents negotiate across jurisdictional boundaries; both corporate, and country? The latter question is of particular concern when one considers the potential for considerable variance between the regulations and policies of different governments and corporations. This is especially evident with the disparity of legislation for privacy in different countries. How can disparate regulations be accommodated effectively? What technologies are appropriate for maintaining user privacy and for protecting sensitive information for agent-based e-commerce? In this paper, we describe the issues that provoke privacy challenges for agent-based e-commerce due to current and impending privacy legislation as well as an approach for policy-driven privacy negotiation for use in distributed agent-based systems.
منابع مشابه
Symmetric Adaptive Customer Modeling for Electronic Commerce in a Distributed Environment
Electronic Commerce involves more than simple online transactions, it also deals with several other elds such as market research, customers care, document exchange and customer modeling. Our paper deals with the customer modeling issue, rst introduced in the companion paper 4], where a model is presented of a system that can adapt its response to customers. We present here the necessary extensi...
متن کاملAn ACID Framework for Electronic Commerce
In this paper we deene several properties necessary for electronic commerce. Principal among these are the ACID contractual properties of agreement, causality, isolation, and durability. Although similar to the ACID database transactional properties, our ACID properties are derived more directly from the elements of contract law. Also included are the security properties of privacy , authentica...
متن کاملFault Tolerance in Mobile Computing using Multi Agent Environment for Electronic-Business Applications
Mobile agent technology has become a new paradigm for distributed real-time systems because of their inherent advantages. In any distributed system, along with other issues, survivability and fault tolerance are vital issues for deploying mobile-agent systems. E-business becoming a prominent domain for deploying agent technology, it also faces reliability problems due to the failure of agent pl...
متن کاملElectronic Auctions with Private Bids
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for performing sealed-bid electronic auctions which preserve the privacy of the submitted bids using a form of secure distributed computation. Bids are never revealed to any party, even after the auction is completed. Both rst-price and second-price (Vickrey) auctions are supported, and the computational c...
متن کاملبررسی رابطه تجارت الکترونیکی و رفتار مشتری
Nowadays, in business terms, the most important development to arise from the current swathe of technological advances is the electronic commerce. The electronic commerce is one of the most obvious interests in the digital economy. Electronic market in comparison with traditional market has an important challenge about more competition pressures and less customer's loyalty. Therefore in the ele...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002