Handbook of Privacy and Privacy-Enhancing Technologies
The Case of Intelligent Software Agents
Editors:
G.W. van Blarkom RE
drs. J.J. Borking
dr.ir. J.G.E. Olk
ISBN 90 74087 33 7
Printer: TNO-FEL, P.O. Box 96864, 2509 JG, The Hague, The Netherlands
Publisher: College bescherming persoonsgegevens, Copyright © 2003
Address: P.O. Box 93374, 2509 AJ, The Hague, The Netherlands
Email: info@cbpweb.nl
A draft version of the book is available here as a PDF document.
We are currently seeking a publisher.
Download the Handbook
This is a very large PDF document (6.6 MB; 372 pages) so don't
try to view it in your browser. Instead download the file and
then open it in a PDF-compatible reader (e.g., Adobe Reader).
About the Handbook
The handbook was established within the PISA (Privacy
Incorporated Software Agent) project supported by the European
Union (project RTD IST-2000-26038). This handbook presents the
results of the joint study by the Dutch Data Protection
Authority, TNO, Delft University of Technology, Sentient Machine
Research, FINSA Consulting, National Research Council of Canada and
GlobalSign, as partners in the PISA project. With this study the
partners have attempted to identify possible threats to the
privacy of individuals resulting from the use of agent
technology. Secondly, the study sought to identify and
demonstrate ways of applying Privacy-Enhancing Technologies (PET)
to agent technology in such a way as to eliminate the impact of
these threats.
Objectives of the Handbook
The objectives of the handbook on Privacy-Enhancing Technologies (PET) and Intelligent
Software Agents (ISAs) are:
- to describe the privacy related issues (privacy preferences, privacy threats and possible
solutions) to the use of software agents in general and illuminate these aspects
by describing in detail several cases;
- to describe a solution (Privacy Ontology and Privacy rules and policies) for a software
agent such that it can act according to the EC-Directive;
- to describe method for Privacy by Design;
- to describe technical solutions for Privacy protection for networks, human computer
interfaces, public key infrastructures, cryptography and data mining and matching;
to describe other initiatives and standards for privacy protection ands to discuss
opportunities and area’s of new research;
- to act as a guideline for designers of software agents to meet privacy regulations;
to provide customers with information that allows them to draw up privacy aware
system specification involving software agents.
Table of Contents
Chapters
- 1 Introduction
- 2 Privacy
- 3 PET
- 4 The Development of Agent Technology
- 5 Providing privacy to agents in an untrustworthy environment
- 6 Public Key Infrastructure
- 7 Evaluation and Auditing
- 8 Privacy architecture for agents
- 9 Trust model and network aspects
- 10 Design method
- 11 Data Mining
- 12 Human Computer Interaction
- 13 Conclusions and future outlook
- Bibliography
Appendices
- A Applying the handbook: The Job Market Case
- B Aspects of the PISA demonstrator
- C Overview of threats per actor
- D Overview of available PISA deliverables
- E PISA project information
- F PISA Project consortium