6 CONCLUSIONS AND
PERSPECTIVES
In this paper we have proposed a model we called hip-
pocratic multi-agent systems, HiMAS. Such a system
has to respect nine principles to preserve privacy.
HiMAS agents must be able to represent their pri-
vate sphere by storing its characteristics and by man-
aging it by itself. After a data transaction, the agency
must play a role in privacy preservation.
By adapting nine of the principles of (Agrawal
et al., 2002) to multi-agent systems, a HiMAS can
enable to guarantee the sensitive data communication
and give a vision of data becoming, contrary to clas-
sic agent models or in (W3C, 2002). Our model also
takes advantage of the multi-agent systems character-
istics like decentralization, autonomy and openness in
an application context such as the Web.
The HiMAS model opens a lot of research and de-
velopment perspectives. On a theoretical standpoint
the formalization of many features of a HiMAS can
be studied with interest. On a more practical level,
the design of various components of a HiMAS is also
an interesting issue. In fact, we hope this model will
be a useful basic block for the research community.
ACKNOWLEDGEMENTS
This work was supported by Web Intelligence project,
financed by the ISLE cluster of Rh
ˆ
one-Alpes region.
REFERENCES
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2002).
Hippocratic databases. In Proceedings of the Interna-
tional Conference Very Large Data Bases.
Baase, S. (2003). A Gift of Fire: Social, Legal, and Ethical
Issues in Computing. Prentice-Hall.
Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Kupcu, A.,
Lysyanskaya, A., and Rachlin, E. (2007). Making P2P
accountable without losing privacy. In Proceedings of
Workshop on Privacy in the Electronic Society.
Bergenti, F. (2005). Secure, trusted and privacy-aware in-
teractions in large-scale multiagent systems. In Pro-
ceedings of the Workshop From Objects to Agents.
Bratman, M. E. (1987). Intention, plans, and practical
reason. O’Reilly, Harvard University Press: Cam-
bridge,MA.
Ciss
´
ee, R. and Albayrak, S. (2007). Experimental analysis
of privacy loss in dcop algorithms. In Proceedings
of 6th International Joint Conference on Autonomous
Agents and Multiagent Systems.
Cranor, L. F. (2002). Web Privacy with P3P. O’Reilly.
Damiani, E., di Vimercati, S. D. C., Paraboschi, S., and
Samarati, P. (2004). P2P-based collaborative spam
detection and filtering. In Proceedings of 4th Inter-
national Conference on Peer-to-Peer Computing.
Demazeau, Y., Melaye, D., and Verrons, M.-H. (2006). A
decentralized calendar system featuring sharing, trust-
ing and negotiating. In Proceedings of the Inter-
national Conference on Industrial, Engineering and
Other Applications of Applied Intelligent Systems.
Demeulenaere, P. (2002). Difficulties of private life charac-
terization from a sociologic point of view. In Privacy
in Information Society, volume 11.
Deswarte, Y. and Melchor, C. A. (2006). Current and fu-
ture privacy enhancing technologies for the internet.
Annales des T
´
el
´
ecommunications, 61:399–417.
Freuder, E. C., Minca, M., and Wallace, R. J. (2001).
Privacy/efficiency tradeoffs in distributed meeting
scheduling by constraint-based agents. In Proceed-
ings of 7th International Joint Conference on Artifi-
cial Intelligence Workshop on Distributed Constraint
Reasoning.
Greenstadt, R., Pearce, J. P., Bowring, E., and Tambe, M.
(2006). Experimental analysis of privacy loss in dcop
algorithms. In Proceedings of 5th International Joint
Conference on Autonomous Agents and Multiagent
Systems. ACM.
Jennings, N. R. and Wooldridge, M. (1999). Agent technol-
ogy: Foundations, applications and markets. Journal
of Artificial Societies and Social Simulation, 2(4).
Nzouonta, J., Silaghi, M.-C., and Yokoo, M. (2004). Se-
cure computation for combinatorial auctions and mar-
ket exchanges. In Proceedings of 3rd International
Joint Conference on Autonomous Agents and Multia-
gent Systems.
Palen, L. and Dourish, P. (2003). Unpacking ”privacy” for a
networked world. In Proceedings of the 2003 Confer-
ence on Human Factors in Computing Systems. ACM.
Rezgui, A., Ouzzani, M., Bouguettaya, A., and Medjahed,
B. (2002). Preserving privacy in web services. In
Proceedings of the Workshop on Web Information and
Data Management.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. IEEE
Computer, 29(2).
Thomson, J. J. (1975). The right of privacy. Philosophy and
Public Affairs 4: 295-314.
W3C (2002). Plateform for privacy preferences,
http://www.w3.org/p3p/.
Westin, A. F. (1967). Special report: legal safeguards to
insure privacy in a computer society. Commun. ACM.
Yokoo, M., Suzuki, K., and Hirayama, K. (2005). Secure
distributed constraint satisfaction: reaching agreement
without revealing private information. Artificial Intel-
ligence, 161(1-2).
HIPPOCRATIC MULTI-AGENT SYSTEMS
307