Ackerman M. S., Cranor L. F., Reagle J.1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In EC'99: Proceedings of the 1st ACM Conference on Electronic Commerce, Feldman, S. & Wellman, M. (eds). ACM, 1–8.

Acquisti A., Gritzalis S., Lambrinoudakis C., di Vimercati S. (eds) 2008. Digital Privacy: Theory, Technologies, and Practices. Auerbach Publications.

Aïmeur E., Brassard G., Fernandez J. M., Onana F. S. M.2006. Privacy-preserving demographic filtering. In Proceedings of the 2006 ACM Symposium on Applied computing, SAC '06, 872–878.

Alberola J. M., Such J. M., Garcia-Fornes A., Espinosa A., Botti V.2010. A performance evaluation of three multiagent platforms. Artificial Intelligence Review34, 145–176.

Balke T., Eymann T.2008. The conclusion of contracts by software agents in the eyes of the law. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 771–778.

Barth A., Datta A., Mitchell J. C., Nissenbaum H.2006. Privacy and contextual integrity: framework and applications. In Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE Computer Society, 184–198.

Bhargav-Spantzel A., Camenisch J., Gross T., Sommer D.2007. User centricity: a taxonomy and open issues. Journal of Computer Security15, 493–527.

Bilge L., Strufe T., Balzarotti D., Kirda E.2009. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW '09, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 551–560.

Bishop M.2002. Computer Security: Art and Science. Addison-Wesley.

Boella G., van der Torre L., Verhagen H.2007. Introduction to normative multiagent systems. In Normative Multi-agent Systems, number 07122 in ‘Dagstuhl Seminar Proceedings, Boella, G., van der Torre, L. & Verhagen, H. (eds). Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI).

Borking J., Van Eck B., Siepel P., Bedrijf D.1999. Intelligent Software agents: Turning a Privacy Threat into a Privacy Protector. Registratiekamer.

Bostwick G. L.1976. A taxonomy of privacy: repose sanctuary and intimate decisions. California Law Review64(5), 1447–1483.

Brazier F., Oskamp A., Prins C., Schellekens M., Wijngaards N.2004. Anonymity and software agents: an interdisciplinary challenge. Artificial Intelligence and Law12, 137–157.

Brito I., Meseguer P.2003. Distributed forward checking. Principles and Practice of Constraint Programming, Lecture Notes in Computer Science 2833, 801–806.

Bygrave L.2001. Electronic agents and privacy: a cyberspace odyssey 2001. International Journal of Law and Information Technology9(3), 275–294.

Camp L. J.1996. Privacy & Reliability in Internet Commerce. PhD thesis, Department of Computer Science, Carnegie Mellon University.

Carrara E., Hogben G.2007. Reputation-based systems: a security analysis, ENISA Position Paper.

Chaum D.1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM24, 84–90.

Chaum D.1985. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM28, 1030–1044.

Chen B.-C., Kifer D., LeFevre K., Machanavajjhala A.2009. Privacy-preserving data publishing. Foundations and Trends in Databases2(1–2), 1–167.

Cheng A., Friedman E. (2005), Sybil proof reputation mechanisms. In Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, P2PECON '05, Friedman, E. & Sirer, E. G. (eds). ACM, 128–132.

Chopra S., White L.2004. Artificial agents – personhood in law and philosophy. In Proceedings of the 13th European Conference on Artificial Intelligence (ECAI 2004), 635–639.

Chopra S., White L.2007. Privacy and artificial agents, or, is google reading my email? In Proceedings of the 20th International Joint Conference on Artificial Intelligence, Sangal, R., Mehta, H. & Bagga, R. K. (eds). Morgan Kaufmann Publishers Inc., 1245–1250.

Cissèe R.2003. An architecture for agent-based privacy-preserving information filtering. In Proceedings of the Sixth International Workshop on Trust, Privacy, Deception and Fraud in Agent Systems.

Cissèe R., Albayrak S.2007. An agent-based approach for privacy-preserving recommender systems. In Proceedings of the 6th International JointCconference on Autonomous Agents and Multiagent Systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 182:1–182:8.

Clauβ S., Kesdogan D., Kölsch T.2005. Privacy enhancing identity management: protection against re-identification and profiling. In DIM '05: Proceedings of the 2005 Workshop on Digital Identity Management, Atluri, V., Samarati, P. & Goto, A. (eds). ACM, 84–93.

Crépin L, Demazeau Y., Boissier O., Jacquenet F.2009. Sensitive data transaction in hippocratic multi-agent systems. In ‘Engineering Societies in the Agents World IX’, Artikis, A., Picard, G. & Vercouter, L. (eds). Springer-Verlag, 85–101.

Crépin L., Vercouter L., Boissier O., Demazeau Y., Jacquenet F.2008. Hippocratic multi-agent systems. In Proceedings of the Tenth International Conference on Enterprise Information Systems ICEIS, 301–307.

Criado N., Argente E., Botti V.2011. Open issues for normative multi-agent systems. AI Communications24(3), 233–264.

Criado N., Argente E., Julian V., Botti V.2009. Designing virtual organizations. In Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS2009), volume 55 of Advances in Soft Computing, Salamanca, Spain, 440–449.

Cuenca Grau B., Horrocks I.2008. Privacy-preserving query answering in logic-based information systems. In Proceedings of the 2008 Conference on ECAI 2008: 18th European Conference on Artificial Intelligence, Ghallab, M., Spyropoulos, C., Fakotakis, N. & Avouris, N. (eds). IOS Press, 40–44.

Diaz C.2006. Anonymity metrics revisited. In Anonymous Communication and its Applications, number 05411 in ‘Dagstuhl Seminar Proceedings, Dolev, S., Ostrovsky, R. & Pfitzmann, A. (eds). IBFI, 147–166.

Dierks T., Allen C.1999. The tls protocol version 1.0, RFC 2246, http://www.ietf.org/rfc/rfc2246.txt [retrieved February 2011].

Dingledine R., Mathewson N., Syverson P.2004. Tor: the second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, 303–320.

Farkas C., Jajodia S.2002. The inference problem: a survey. ACM SIGKDD Explorations Newsletter4(2), 11.

Fasli M.2007a. Agent Technology for E-Commerce. John Wiley & Sons.

Fasli M.2007b.On agent technology for e-commerce: trust, security and legal issues. Knowledge Engineering Review22(1), 3–35.

FIPA1998. FIPA Agent Security Management, FIPA. http://www.fipa.org/specs/fipa00020/OC00020A.html

Fischer-Hübner S., Hedbom H.2008. Benefits of privacy-enhancing identity management. Asia-Pacific Business Review10(4), 36–52.

Friedman E. J., Resnick P.1998. The social cost of cheap pseudonyms. Journal of Economics and Management Strategy10, 173–199.

Frier A., Karlton P., Kocher P.1996. The secure socket layer. Technical Report MSU-CSE-00-2, Netscape Communications.

Gangopadhyay A. (ed.) 2001. Managing Business with Electronic Commerce: Issues and Trends. IGI Publishing.

Garfinkel S.2001. Database Nation: The Death of Privacy in the 21st Century. O'Reilly & Associates, Inc.

Garfinkel S.2009. Privacy requires security, not abstinence: protecting an inalienable right in the age of facebook, http://www.technologyreview.com/computing/22831/

Gibbins N., Harris S., Shadbolt N.2004. Agent-based semantic web services. Web Semantics: Science, Services and Agents on the World Wide Web1(2), 141–154.

Goldschlag D., Reed M., Syverson P.1999. Onion routing for anonymous and private internet connections. Communications of the ACM42, 39–41.

Green K., Derlega V. J., Mathews A.2006. In The Cambridge Handbook of Personal Relationships. Cambridge University Press, chapter Self-Disclosure in Personal Relationships, 409–427.

Greenstadt R., Grosz B., Smith M. D.2007. Ssdpop: improving the privacy of dcop with secret sharing. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent systems, AAMAS '07, Durfee, E., Yokoo, M., Huhns, M. & Shehory, O. (eds). ACM, 171:1–171:3.

Greenstadt R., Pearce J. P., Tambe M.2006. Analysis of privacy loss in distributed constraint optimization. In Proceedings of the 21st National Conference on Artificial IntelligenceVolume 1, Cohn, A. (ed.). AAAI Press, 647–653.

Gross R., Acquisti A.2005. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Atluri, V., De Capitani di Vimercati, S. & Dingledine, R. (eds). ACM, 71–80.

Hansen M., Berlich P., Camenisch J., Clau S., Pfitzmann A., Waidner M.2004. Privacy enhancing identity management. Information Security Technical Report9(1), 35–44.

Hansen M., Schwartz A., Cooper A.2008. Privacy and identity management. IEEE Security & Privacy6(2), 38–45.

Head M., Yuan Y.2001. Privacy protection in electronic commerce – a theoretical framework. Human Systems Management20(2), 149–160.

Hildebrandt M., Gutwirth S.2008. Profiling the European Citizen: Cross-Disciplinary Perspectives. Springer Publishing Company, Inc..

Hoffman D., Novak T., Peralta M.1999. Building consumer trust online. Communications of the ACM42(4), 80–85.

Hoffman K., Zage D., Nita-Rotaru C.2009. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys42, 1:1–1:31.

Huberman B. A., Adar E., Fine L. R.2005. Valuating privacy. IEEE Security and Privacy3(5), 22–25.

Ismail L.2008. A secure mobile agents platform. Journal of Communications3(2), 1–12.

JADE Board2005. Jade security guide, http://jade.tilab.com

Jaiswal A., Kim Y., Gini M. L.2004. Design and implementation of a secure multi-agent marketplace. Electronic Commerce Research and Applications3(4), 355–368.

Jennings N., Faratin P., Lomuscio A., Parsons S., Wooldridge M., Sierra C.2001. Automated negotiation: prospects, methods and challenges. Group Decision and Negotiation10(2), 199–215.

Jøsang A., Golbeck J.2009. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (STM 2009).

Jøsang A., Ismail R., Boyd C.2007. A survey of trust and reputation systems for online service provision. Decision Support System43(2), 618–644.

Jøsang A., Patton M., Ho A.2001. Authentication for humans. In Proceedings of the 9th International Conference on; Telecommunication Systems (ICTS2001).

Kang J.1998. Information privacy in cyberspace transactions. Stanford Law Review50(4), 1193–1294.

Kerr R., Cohen R.2009. Smart cheaters do prosper: defeating trust and reputation systems. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 993–1000.

Koops B. -J., Leenes R.2006. Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit – DuD30, 553–556.

Korba L., Song R., Yee G.2002. Anonymous communications for mobile agents. In Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications, MATA '02, 171–181.

Krause A., Horvitz E.2008. A utility-theoretic approach to privacy and personalization. In AAAI'08: Proceedings of the 23rd National Conference on Artificial Intelligence, Cohn, A. (ed.). AAAI Press, 1181–1188.

Krupa Y., Vercouter L.2010. Contextual integrity and privacy enforcing norms for virtual communities. In 11th International Workshop on Coordination, Organization, Institutions and Norms in Multi-Agent Systems (COIN@MALLOW2010), 150–165.

Lebanon G., Scannapieco M., Fouad M. R., Bertino E.2006. Beyond k-anonymity: a decision theoretic framework for assessing privacy risk. In Privacy in Statistical Databases, 217–232.

Lee H.-H., Stamp M.2008. An agent-based privacy-enhancing model. Information Management & Computer Security16(3), 305–319.

Leuf B., Cunningham W.2001. The Wiki Way: Quick Collaboration on the Web. Addison-Wesley Longman Publishing Co., Inc.

Lilien L., Bhargava B.2008. Privacy and trust in online interactions. In Online Consumer Protection: Theories of Human Relativism, Chen, K. & Fadlalla, A. (eds). Information Science Reference, 85–122.

Longstaff T., Ellis J., Shawn H., Lipson H., Mcmillan R., Pesante H. L., Simmel D.1997. Security of the internet. The Froehlich/Kent Encyclopedia of Telecommunications15, 231–255.

Luck M., McBurney P., Shehory O., Willmott S.2005. Agent Technology: Computing as Interaction (A Roadmap for Agent Based Computing). AgentLink.

Maheswaran R., Pearce J., Bowring E., Varakantham P., Tambe M.2006. Privacy loss in distributed constraint reasoning: a quantitative framework for analysis and its applications. Autonomous Agents and Multi-Agent Systems13, 27–60.

Menczer F., Street W. N., Vishwakarma N., Monge A. E., Jakobsson M.2002. Intellishopper: a proactive, personal, private shopping assistant. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 3, AAMAS '02, 1001–1008.

Milojicic D., Breugst M., Busse I., Campbell J., Covaci S., Friedman B., Kosaka K., Lange D., Ono K., Oshima M., Tham C., Virdhagriswaran S., White J.1998. Masif: The omg mobile agent system interoperability facility. Personal and Ubiquitous Computing2, 117–129. 10.1007/BF01324942. http://dx.doi.org/10.1007/BF01324942

doi: 10.1007/BF01324942

Mitchell T., Caruana R., Freitag D., McDermott J., Zabowski D.1994. Experience with a learning personal assistant. Communications of the ACM37(7), 80–91.

Montaner M., López B., De La Rosa J.2003. A taxonomy of recommender agents on the internet. Artificial Intelligence Review19(4), 285–330.

Newman A. E.2004. Cougaar developers’ guide, http://www.cougaar.org

Neuman C., Yu T., Hartman S., Raeburn K.2005. The Kerberos Network Authentication Service (V5), number 4120 in ‘Request for Comments. IETF.

Nissenbaum H.2004. Privacy as contextual integrity. Washington Law Review79(1).

Odlyzko A.2003. Privacy, economics, and price discrimination on the internet. In Proceedings of the 5th International Conference on Electronic Commerce, ICEC '03, Sadeh, N., Dively, M. J., Kauffman, M., Labrou, Y., Shehory, O., Telan, R. & Cranor, L. (eds). ACM, 355–366.

Olson J. S., Grudin J., Horvitz E.2005. A study of preferences for sharing and privacy. In CHI '05: CHI '05 Extended Abstracts on Human Factors in Computing Systems, Van der Veer, G. & Gale, C. (eds). ACM, 1985–1988.

Palen L., Dourish P.2003. Unpacking privacy for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Ssystems, Cockton, G. & Korhonen, P. (eds). ACM, 129–136.

Petkovic M., Jonker W. (eds) 2007. Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications). Springer-Verlag.

Pfitzmann A., Hansen M.2010. A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, http://dud.inf.tu-dresden.de/AnonTerminology.shtml. v0.34.

Piolle G., Demazeau Y., Caelen J.2007. Privacy management in user-centred multi-agent systems. In Engineering Societies in the Agents World VII, Lecture Notes in Computer Science 4457, 354–367. Springer.

Poslad S., Calisti M.2000. Towards improved trust and security in FIPA agent platforms. In Workshop on Deception, Fraud and Trust in Agent Societies, Barcelona, Spain.

Poslad S., Charlton P., Calisti M.2003. Specifying standard security mechanisms in multi-agent systems. In Proceedings of the 2002 International Conference on Trust, Reputation, and Security: Theories and Practice, AAMAS'02. Springer-Verlag, 163–176. http://portal.acm.org/citation.cfm?id=1762128.1762141

Quillinan T. B., Warnier M., Oey M., Timmer R., Brazier F.2008. Enforcing security in the agent scape middleware. In Proceedings of the 2008 Workshop on Middleware Security, MidSec '08, Scandariato, R. & Russello, G. (eds). ACM, 25–30.

Ramchurn S., Huynh D., Jennings N.2004. Trust in multi-agent systems. The Knowledge Engineering Review19(1), 1–25.

Rannenberg K., Royer D., Deuker A. (eds) 2009. The Future of Identity in the Information Society: Challenges and Opportunities. Springer Publishing Company, Incorporated.

Recursion Software Inc.2008. Voyager security guide, http://www.recursionsw.com/

Roth V., Jalali-Sohi M.2001. Concepts and architecture of a security-centric mobile agent server. In Proceedings of theInternational Symposium on Autonomous Decentralized System.

Sabater J., Sierra C.2005. Review on computational trust and reputation models. Artificial Intelligence Review24, 33–60.

Schermer B.2007. Software Agents, Surveillance, and the Right to Privacy: A Legislative Framework for Agent-enabled surveillance. Amsterdam University Press.

Seigneur J.-M., Jensen C. D.2004. Trading privacy for trust. In Trust Management. Springer, 93–107.

Senicar V., Jerman-Blazic B., Klobucar T.2003. Privacy-enhancing technologies–approaches and development. Computer Standards & Interfaces25(2), 147–158.

Shannon C. E.1948. A mathematical theory of communication. Bell System Technical Journal27(3), 379–423.

Sierra C.2004. Agent-mediated electronic commerce. Autonomous Agents and Multi-Agent Systems9(3), 285–301.

Sierra C., Botti V., Ossowski S.2011. Agreement computing. KI-Künstliche Intelligenz25(1), 57–61.

Sierra C., Debenham J.2008. Information-based deliberation. In AAMAS '08: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, Padgham, L., Parkes, D. C., Müller, J. P. & Parsons, S. (eds). International Foundation for Autonomous Agents and Multiagent Systems, 689–696.

Silaghi M. C., Mitra D.2004. Distributed constraint satisfaction and optimization with privacy enforcement. In Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT '04. IEEE Computer Society, 531–535.

Smith H. J., Milberg S. J.1996. Information privacy: measuring individuals’ concerns about organizational practices. MIS Quarterly20, 167–196.

Solanas A., Martìınez-ballesté A.2009. Advances in Artificial Intelligence for Privacy Protection and Security. World Scientific Publishing Co., Inc.

Solove D.2002. Conceptualizing privacy. California Law Review90(4), 1087–1155.

Solove D.2006. A taxonomy of privacy. University of Pennsylvania Law Review154(3), 477–560.

Spiekermann S.2006. Individual price discriminaton – an impossibility?. In International Conference for HumanComputer Interaction (CHI'2006), Workshop on Privacy and Personalization’.

Spiekermann S., Cranor L. F.2009. Engineering privacy. IEEE Transactions on Software Engineering35(1), 67–82.

Stallings W.2010. Network Security Essentials: Applications and Standards. Prentice Hall.

Stamp M.2006. Information Security: Principles and Practice. Wiley-Interscience.

Such J. M.2011. Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València.

Such J. M., Alberola J. M., Espinosa A., Garcia-Fornes A.2011a.A group-oriented secure multiagent platform. Software: Practice and Experience41(11), 1289–1302.

Such J. M., Garcia-Fornes A., Espinosa A., Bellver J.2013. Magentix2: A privacy-enhancing Agent Platform. Engineering Applications of Artificial Intelligence26(1), 96–109.

Such J. M., Espinosa A., Garcia-Fornes A., Botti V.2011b.Partial identities as a foundation for trust and reputation. Engineering Applications of Artificial Intelligence24(7), 1128–1136.

Such J. M., Espinosa A., Garcia-Fornes A., Sierra C.2011d. Privacy-intimacy tradeoff in selfdisclosure. In Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS2011). IFAAMAS, 1189–1190.

Such J. M., Espinosa A., Garcia-Fornes A., Sierra C.2012a.Self-disclosure decision making based on intimacy and privacy. Information Sciences211, 93–111.

Such J. M., Serrano E., Botti V., Garca-Fornes A.2012b. Strategic pseudonym change in agent-based E-commerce. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012), Valencia, Spain, 1377–1378.

Taylor H.2003. Most People Are “Privacy Pragmatists” Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits., Harris Interactive. Retrieved February 27, 2011, from http://www.harrisinteractive.com/vault/Harris-Interactive-Poll-Research-Most-People-Are-Privacy-Pragmatists-Who-While-Conc-2003-03.pdf

Tentori M., Favela J., Rodriguez M. D.2006. Privacy-aware autonomous agents for pervasive healthcare. IEEE Intelligent Systems21, 55–62.

Udupi Y. B., Singh M. P.2010. Information sharing among autonomous agents in referral networks. In Agents and Peer-to-Peer Computing, Joseph, S. R., Despotovic, Z., Moro, G. & Bergamaschi, S. (eds). Springer-Verlag, 13–26.

Ugurlu S., Erdogan N.2005. An overview of secmap secure mobile agent platform. In Proceedings of Second International Workshop on Safety and Security in Multiagent Systems.

van Blarkom G., Borking J., Olk J. (eds) 2003. Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents. College bescherming persoonsgegevens.

van Elst L., Abecker A., Dignum V.2004. Agent-mediated Knowledge Management: International Symposium Amkm 2003, Stanford, CA, USA, March 2426, 2003: Revised and Invited Papers, Lecture Notes in Computer Science 2926, 428. Springer-Verlag.

van Otterloo S.2005. The value of privacy: optimal strategies for privacy minded agents. In AAMAS '05: Proceedings of the Fourth International Joint conference on Autonomous Agents and Multiagent Systems, Pechoucek, M., Steiner, D. & Thompson, S. (eds). ACM, 1015–1022.

Wallace R. J., Freuder E. C.2005. Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving. Artificial Intelligence161, 209–227.

Warnier M., Brazier F.2010. Anonymity services for multi-agent systems. Web Intelligence and Agent Systems8(2), 219–232.

Warren S., Brandeis L.1890. The right to privacy. Harvard Law Review4(5), 193–220.

Weitnauer E., Thomas N., Rabe F., Kopp S.2008. Intelligent agents living in social virtual environments bringing max into second life. In Intelligent Virtual Agents (IVA). Springer, 552–553.

Westin A.1967. Privacy and Freedom. Atheneum.

Westin A.1984. The origins of modern claims to privacy. In Philosophical Dimensions of Privacy: An Anthology, Schoeman, F. D. (ed.). Cambridge University Press, 56–74.

Wooldridge M.2002. An Introduction to MultiAgent Systems. Wiley.

Xu H., Shatz S. M.2003. Adk: an agent development kit based on a formal design model for multi-agent systems. Journal of Automated Software Engineering10, 337–365.

Yao M. Z., Rice R. E., Wallis K.2007. Predicting user concerns about online privacy. J American Society for Information Science and Technology58(5), 710–722.

Yassine A., Shirehjini A. A. N., Shirmohammadi S., Tran T. T.2010. An intelligent agent-based model for future personal information markets. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2, 457–460, Toronto, Canada.

Yassine A., Shirmohammadi S.2009. Measuring users’ privacy payoff using intelligent agents. In Computational Intelligence for Measurement Systems and Applications, CIMSA '09, 169–174.

Yokoo M., Suzuki K., Hirayama K.2005. Secure distributed constraint satisfaction: reaching agreement without revealing private information. Artificial Intelligence161, 229–245.

Yu H., Kaminsky M., Gibbons P. B., Flaxman A.2006. Sybilguard: defending against sybil attacks via social networks. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '06, Rizzo, L., Anderson, T. & McKeown, N. (eds). ACM, 267–278. http://doi.acm.org/10.1145/1159913.1159945

Zheleva E., Getoor L.2009. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In WWW '09: Proceedings of the 18th International Conference on World Wide Web, Quemada, J., León, G., Maarek, Y. S. & Nejdl, W. (eds). ACM, 531–540.

Zhu Z., Wang G., Du W.2009. Deriving private information from association rule mining results. In Proceedings of the 2009 IEEE International Conference on Data Engineering, Ioannidis, Y. E., Lee, D. L. & Ng, R. T. (eds). IEEE Computer Society, 18–29.