Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents

Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents


in regards to the Handbook

The guide was once validated in the PISA (Privacy integrated software program Agent) undertaking supported via the ecu Union (project RTD IST-2000-26038). This instruction manual provides the result of the joint learn via the Dutch information safety Authority, TNO, Delft collage of expertise, Sentient computer study, FINSA Consulting, nationwide examine Council of Canada and GlobalSign, as companions within the PISA venture. With this examine the companions have tried to spot attainable threats to the privateness of people due to using agent know-how. Secondly, the research sought to spot and reveal methods of making use of Privacy-Enhancing applied sciences (PET) to agent know-how in one of these manner as to dispose of the impression of those threats.
Objectives of the Handbook

The pursuits of the guide on Privacy-Enhancing applied sciences (PET) and clever software program brokers (ISAs) are:

to explain the privateness comparable matters (privacy personal tastes, privateness threats and attainable options) to using software program brokers usually and light up those facets through describing intimately a number of cases;
to explain an answer (Privacy Ontology and privateness ideas and rules) for a software program agent such that it could possibly act in line with the EC-Directive;
to explain approach for privateness through Design;
to explain technical ideas for privateness defense for networks, human desktop interfaces, public key infrastructures, cryptography and knowledge mining and matching; to explain different projects and criteria for privateness security ands to debate possibilities and area’s of latest research;
to behave as a tenet for designers of software program brokers to satisfy privateness rules; to supply buyers with info that permits them to attract up privateness acutely aware process specification regarding software program brokers.

Table of Contents
Chapters

1 Introduction
2 Privacy
three PET
four the improvement of Agent Technology
five supplying privateness to brokers in an untrustworthy environment
6 Public Key Infrastructure
7 evaluate and Auditing
eight privateness structure for agents
nine belief version and community aspects
10 layout method
eleven info Mining
12 Human laptop Interaction
thirteen Conclusions and destiny outlook
Bibliography

Appendices

A employing the guide: The task industry Case
B facets of the PISA demonstrator
C assessment of threats in step with actor
D assessment of accessible PISA deliverables
E PISA undertaking information
F PISA undertaking consortium

Show sample text content

Download sample