<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Toward a Privacy Enhancing Framework in Egovernment</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Wiem</forename><surname>Hammami</surname></persName>
							<email>wiem.hammami@ymail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Management of Tunis 41</orgName>
								<orgName type="laboratory">Intelligent Information Engineering Laboratory Higher</orgName>
								<address>
									<addrLine>Rue de la Liberté, Cité Bouchoucha 2000 Le Bardo</addrLine>
									<settlement>Tunis</settlement>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lamjed</forename><forename type="middle">Ben</forename><surname>Said</surname></persName>
							<email>lamjed.bensaid@isg.rnu.tn</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Management of Tunis 41</orgName>
								<orgName type="laboratory">Intelligent Information Engineering Laboratory Higher</orgName>
								<address>
									<addrLine>Rue de la Liberté, Cité Bouchoucha 2000 Le Bardo</addrLine>
									<settlement>Tunis</settlement>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sameh</forename><surname>Hadouaj</surname></persName>
							<email>hadouaj@yahoo.fr</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Management of Tunis 41</orgName>
								<orgName type="laboratory">Intelligent Information Engineering Laboratory Higher</orgName>
								<address>
									<addrLine>Rue de la Liberté, Cité Bouchoucha 2000 Le Bardo</addrLine>
									<settlement>Tunis</settlement>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">François</forename><surname>Charoy</surname></persName>
							<email>francois.charoy@loria.fr</email>
							<affiliation key="aff1">
								<orgName type="department">Applications Campus Scientifique</orgName>
								<orgName type="laboratory" key="lab1">Loria</orgName>
								<orgName type="laboratory" key="lab2">Lorrain Research Laboratory in Computer Science</orgName>
								<address>
									<postCode>54506</postCode>
									<settlement>Vandoeuvre-lès-Nancy, Cedex</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Khaled</forename><surname>Ghedira</surname></persName>
							<email>khaled.ghedira@isg.rnu.tn</email>
							<affiliation key="aff0">
								<orgName type="department">Institute of Management of Tunis 41</orgName>
								<orgName type="laboratory">Intelligent Information Engineering Laboratory Higher</orgName>
								<address>
									<addrLine>Rue de la Liberté, Cité Bouchoucha 2000 Le Bardo</addrLine>
									<settlement>Tunis</settlement>
									<country key="TN">Tunisia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Toward a Privacy Enhancing Framework in Egovernment</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">AB1E770FB1B8E5F4418BEECC89AAEBAE</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T21:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>E-government</term>
					<term>privacy</term>
					<term>trust</term>
					<term>multi-agent systems</term>
					<term>simulation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>E-government involves data sharing between different partners such as citizens and government agencies. Thus, the use of personal data in such cooperative environment must be done in legal ways and for legal purposes. In this context, issues related to data protection, such as privacy, have to be considered. This paper adopts a multi-agent based approach to manage privacy concerns in e-government systems. The proposed model provides a mechanism for e-government systems to evaluate trust degree reached by digital government processes. For this purpose, concepts of responsibility proposed in multi-agent systems and access rights used in security models, are integrated in this work. The research provides an evaluative framework for trust degree related to e-government process.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Privacy refers to the ability of individuals to control the collection, retention, and distribution of information about themselves <ref type="bibr" target="#b0">[1]</ref>. In the context of e-government, privacy is a critical issue as there is an increased amount of private data shared between different agencies. For example, to access public service online, citizens must fill in some forms that require Personally Identifiable Information (PII) such as name, social security number, credit card number, etc. Citizens need to know whether their PII are used in the right way and for the right purpose or not. This can be achieved by an enhanced ability of control over their personal information. In this paper, we focus on data privacy, in particular, on privacy protection of personal data exchanged, processed and stored in e-government systems. As citizens act at the front office side of the e-government system, they do not know what happens to their personal information handled in the back office side by government agencies. Agent technology can be a suitable solution for this situation as they can act on behalf of the user. An agent is a computer system situated in some environment, and that is capable of autonomous actions in this environment in order to meet its design objectives <ref type="bibr" target="#b1">[2]</ref>. The main issue of this paper is to propose a mechanism to control the use of personal information by e-government agents based on restrictions imposed on their behavior and to evaluate the trust degree related to e-government process.</p><p>The rest of this paper is structured as follows. In the second section we present different visions for privacy protection in the literature. In section 3 we describe our proposed model including the fundamental concepts used and their formal representations. Section 4 is devoted to experimentations and simulation results. In section 5, we make a comparative study of our work with other proposed model in the literature. Finally, section 6 summarizes the contribution of this work, and provides conclusions and future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related works</head><p>Many approaches have been used to manage privacy concerns. We specially note those based on users preferences such as the P3P (Platform for Privacy Preferences) <ref type="bibr" target="#b2">[3]</ref>. P3P provides technical mechanism to inform web sites users about privacy policy before they release their personal information. However, P3P does not provide mechanism for ensuring that sites act according to their policies <ref type="bibr" target="#b3">[4]</ref>. Additionally, we mention approaches based on security modeling such as the Access Control Decision System. We note for example, the Role-Based Access Control model (RBAC) <ref type="bibr" target="#b4">[5]</ref> that manages privacy through access control systems. In RBAC, users are assigned to roles to have permissions that allow them to perform particular job functions. However, we regret the lack of mechanism ensuring privacy protection of data after their collection in both P3P and RBAC approaches.</p><p>There are also a number of agent based privacy schemas in the literature. We note Hippocratic Multi-Agent Systems (HiMAS) <ref type="bibr" target="#b5">[6]</ref>. HiMAS model define the concept of private sphere of an agent or a user that enable to structure and to represent data involved in privacy management. However, HiMAS model do not define metrics for trust evaluation. We note that existing approaches are often concerned about privacy protection in the data collection phase. But, actually we need to control data after their collection by e-government systems. Our main contribution is that we propose a new privacy schema based on multi-agent systems to handle such drawbacks of the existing knowledge.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Privacy Enhancing Model</head><p>In this section, we introduce our multi-agent based model that we call ABC (Agent-Based Control). First, we describe the concepts used. Then, we present the ABC mechanism, and finally we describe our proposed techniques.</p><p>The ABC model enables to manage privacy concerns in e-government systems. This model offers a mechanism based on the use of a set of privacy rules and a set of information on the parties' rights, roles, responsibilities and restrictions to make a statistical assessment of trust. Consequently, ABC model enables the subsequent authorizations to transfer private data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Model description</head><p>In the ABC model (see Fig. <ref type="figure" target="#fig_0">1</ref>), we define two kinds of agents: Admin agents and AP agents (Authorization Provider agents). Admin agents represent the staff working in government agencies. AP agents are charged to provide authorizations to Admin agents in order to communicate with each other or to access objects in the system. Each Admin agent in our model plays a set of roles (e.g. the tax controller, the mayor, etc). A role includes a set of responsibilities (e.g. mayor roles: sign documents, validate, etc) that are restricted by access-rights (e.g. read only, write, read-write, etc). These access-rights are used to protect the resources and they are managed by a set of privacy rules. Access rights are also justified by a specific context. In fact, what is appropriate in one context can be a violation of privacy in another context. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.1.">Definition of agent responsibility</head><p>We define responsibilities as the restricted behavior of a given agent. In other words, responsibility is the behavior that the system expects from an agent based on restriction rules (RR). We note that restriction rules are used to manage agent behavior at an internal level (e.g. making temporary results in a standard format before continuing execution, requesting specific authorizations before performing some actions, etc.). To more explain the concept of responsibility, let's take this example: we suppose that A 1 is an agent responsible for sending e-mails to agent A 2 (we suppose that e-mails are confidential). When we observe A 1 's behavior, we find that A 1 sends e-mails to agent A 2 and sends a copy to the agent A 3 at the same time.</p><p>Thus, A 1 in this case did not assume his responsibility as some restriction rules are not respected.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.2.">Definition of privacy rules</head><p>Citizens must have control over their personal information handled by government systems. The Fair Information Practices (FIPs) <ref type="bibr" target="#b6">[7]</ref> is an example of control enhanced by legislation, such as: limiting collection and disclosure, identifying purposes, etc.</p><p>In the ABC model, we define the following privacy rules that are in compliance with the FIPs and considered as the core needed to test and apply ABC model:</p><p>-R1: each agent must assume his responsibilities.</p><p>-R2: each agent has access only to objects needed for doing the set of his responsibilities.</p><p>-R3: agent cannot use the context to access linked data outside the set of his responsibilities.</p><p>For the privacy rules specifications, we are based on the notation of the rule-based systems <ref type="bibr" target="#b7">[8]</ref> used in artificial intelligence, such that:</p><formula xml:id="formula_0">R1: Agent (A) ∧ Responsibility (Re) ∧ Responsible-for (A,Re)→Authorization(A, Re) R2: Responsible-for (A,Re) ∧ Access (R,O,Re)→ Authorization(A, Re, R,O) R3: Responsible-for(A,Re)∧Access(R,O,Re)∧(O→J) → NOT(Authorization(A,Re, R,J)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Description of ABC mechanism</head><p>In the ABC model, we define a distributed architecture in which sets of the agent in different groups are interacting with each other. Each group (container) represents the set of Admin agents running in the same e-government agency. To have access to objects in the system or to communicate with other agents, each Admin agent must be authorized from AP agent that exists in his group. To keep control of the system, AP agents use a Rule Base (RB) and a Knowledge Base (KB). RB includes the set of privacy rules and KB includes the set of knowledge in the system: agents, their roles, their responsibilities, their RR, their access-rights and their resources. In ABC model, we suppose that in case of failure, AP agents can switch roles dynamically with Admin agents. AP agents delegate the control of the system to the most trusted Admin agent. This delegation decision is based on the computation of Admin agent's honesty degree that will be explained in the next section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Description of ABC techniques</head><p>In this section, we define techniques used for privacy protection in ABC model: the computation of the trust and the honesty degrees. Formally, our ABC model correspond to the following set: {A, Re, Au, PR, T, R} such that: A: the set of agents in the system Re: the set of agent responsibilities Au: the set of authorizations PR: the set of privacy rules T: the trust degree reached in an e-government process. T is defined as: <ref type="bibr" target="#b0">(1)</ref> where k represents the total number of agents in the system, h represents the honesty of agent j estimated by agent i (see Fig. <ref type="figure">2</ref>). h is defined as follows:</p><p>(2)</p><p>After each transaction, an Admin agent i can give feedback to Admin agent j according to the service quality of j. Thus, a feedback score S is calculated as follows: S= P-N, where P is the number of positive feedbacks left by agents and N is the number of negative feedbacks from agents. The S value is disclosed to all agents in the system. This reputation model has been presented in <ref type="bibr" target="#b8">[9]</ref>. h is decreasing when the agent is performing unauthorized actions. We define two types of such actions: unauthorized access to objects, and unauthorized communications with other agents. We suppose that honesty value is between 0 and 1 and it is disclosed to all agents in the system. α j represents the interaction degree related to agent j. it denotes a weight used to balance T value because we must consider that agents behave differently. In our model, honest agents (having h=1) are rewarded. However, dishonest agents (having h&lt;0,5) are punished.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. Representation of Admin agent's honesty</head><p>We represent risk degree associated to the use of personal information (R), by the following: R = 1-T .</p><p>(3)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Simulation and experimental results</head><p>Using agent technology, we can make « behavioral simulation » that enable us to create a virtual image of the reality. This is considered as a powerful predictive analysis tool that enable decision makers to test their idea via scenario in an artificial environment before implementing their decision in the real world. In this section, we present our Multi-Agent Based Simulation (MABS) of agents' behavior during the company formation process in Tunisia. We chose this scenario because it is complex (involves numerous administrations and many interactions) and requires the collection of many sensitive data at every step. We represent governmental agencies involved in this process by a set of agents (twelve agents) interacting with each other on behalf of the user (the citizen) and we simulate their behavior during the whole process using the ABC model. Our MABS is implemented using JADE platform <ref type="bibr" target="#b9">[10]</ref>. We used JADE because it is a distributed platform and supports agent mobility. The mobility is an important issue of our work for a real application of the proposed model. For the privacy rules' specifications, described in section3, we used the rule engine Jess <ref type="bibr" target="#b10">[11]</ref> to make authorization' decision based on both agent's responsibilities and access rights. To realize our simulation, we made the following hypothesis:</p><p>-All agents initially are honest (having h = 1) -A simulation step corresponds to n successive interactions. In the following simulation results, we assume that n=10.</p><p>At every simulation step, we evaluate Admin agent's honesty and the trust value. The first experimental result is the evaluation of trust degree reached during the running of company formation process. The trust (versus the risk) degree obtained during nine steps of our simulation is plotted in Fig. <ref type="figure" target="#fig_1">3</ref>. As observed, we note that T is increasing notably during the simulation and R is decreasing (as there is a dual relation between T and R).</p><p>According to our model, honest agents (having h=1) are placed in a trusty zone and dishonest agents (having h&lt;0,5) are placed in non-trusty zone. As shown in Fig. <ref type="figure">4</ref> (a), we note that in the first step of our MABS only one agent is honest. However, when we observe agent's behaviors during next steps, we note that the number honest agents increase (Fig. <ref type="figure">4</ref> (b) shows an example of this increase during the step 4 of our MABS).</p><p>According to this interpretation, we find that agents placed in the non-trusty zone want to behave like honest agents, they want to move to the trusty zone. This enabled us to interpret the increase of the trust value during the simulation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">A comparative study</head><p>Regarding to some standard evaluation criteria, such as the use of access control mechanisms, the use of user preferences, the trust evaluation metrics <ref type="bibr" target="#b11">[12]</ref> and the use of anonymity techniques <ref type="bibr" target="#b12">[13]</ref> our work is the most appropriate one that is able to support all of these criteria. The following table summarizes the comparative study of our model with P3P and RBAC models. For each criterion we attribute (+) to the model that supports it and (-) to the model that does not support it. In fact, the use of agent technology in our work, has many advantages: Agent-based models provide a more convincing approach to modeling the real world behaviors due to their ability to explicitly model a component of the real world such as: human, organizations, etc. The dynamicity of the real world including environmental, political and social behaviors can be captured within a software agent. Also, in multi-agent systems, we have the possibility to encapsulate private data. So, we do not need additional security mechanisms to ensure data protection. One of the main characteristics of Multi-Agents Systems (MAS) is the distribution. Using MAS we can have a decentralized framework in which tasks are dispatched to agents in the system. So, we can distribute the control of data transfer and access. Therefore, we take profit from the task-delegation via agents, which is impossible with other approaches.</p><p>In this paper, we proposed a new model for privacy enhancing in e-government context. This model enabled us to build an evaluative framework for trust degree reached for a given e-government process. In the context of e-government it is crucial to build a trust relationship to ensure and enforce the adoption of e-government systems by citizens. Also the proposed approach has the potential benefit of the use of only one trusted entity: the AP agent. For future works we propose to enrich our model by adding further privacy rules. We also plan to incorporate different types of risks related to privacy protection such as risks related to: data collection, data processing, data sharing, etc. Finally, we suggest managing task delegation between Admin agents to ameliorate performances of e-government systems.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. ABC model</figDesc><graphic coords="3,138.14,330.56,345.85,189.89" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Evaluation of Trust (T) and Risk (R)</figDesc><graphic coords="6,195.82,351.98,217.70,131.09" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>A comparative study</figDesc><table><row><cell>Evaluation criteria</cell><cell>Related works (1)</cell><cell>Related works (2)</cell><cell>Our work</cell></row><row><cell></cell><cell>RBAC</cell><cell>P3P</cell><cell>ABC</cell></row><row><cell>Access control</cell><cell>+</cell><cell>-</cell><cell>+</cell></row><row><cell>User preferences</cell><cell>-</cell><cell>+</cell><cell>+</cell></row><row><cell cols="2">Trust evaluation metrics -</cell><cell>-</cell><cell>+</cell></row><row><cell>Anonymity</cell><cell>-</cell><cell>-</cell><cell>+</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments. This work has been supported by a common grant from Tunisian and French government relative to the project STIC DGRSRT/INRIA entitled: multiagent coordination models for e-government systems.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Privacy-Enhancing Technologies for the Internet</title>
		<author>
			<persName><forename type="first">I</forename><surname>Goldberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wagner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Brewer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">COMPCON&apos;97, Proceedings, IEEE</title>
				<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="103" to="109" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Intelligent agents: Theory and practice</title>
		<author>
			<persName><forename type="first">M</forename><surname>Wooldridge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">R</forename><surname>Jennings</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Knowledge Engineering Review</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="115" to="152" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">The Platform for Privacy Preferences1</title>
		<author>
			<persName><forename type="first">L</forename><surname>Cranor</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Specification W3C</publisher>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
	<note>P3P1.</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Protecting Privacy of Health Information through Privacy Broker</title>
		<author>
			<persName><forename type="first">B</forename><surname>Agrawal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bhattacharya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Gupta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">39th International Conference on System Sciences, Proceedings</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Role-based access control models</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Sandhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">J</forename><surname>Coyne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">L</forename><surname>Feinstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Youman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Computer</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="38" to="47" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Hippocratic multi-agent systems</title>
		<author>
			<persName><forename type="first">L</forename><surname>Crépin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Vercouter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Jaquenet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Demazeau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Boissier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th International Conference of Entreprise Information Systems</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="301" to="308" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m">Organisation for Economic Co-operation and Development: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data</title>
				<imprint>
			<date type="published" when="1980">1980</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Handbook of Measuring System Design</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">H</forename><surname>Sydenham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Thorn</surname></persName>
		</author>
		<idno>0-470-02143-8</idno>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>ISBN</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A reputation and trust management broker framework for web applications</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Tai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on e-Technology</title>
				<imprint>
			<publisher>e-Commerce and e-Service</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="262" to="269" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">JADE-A Java Agent Development Framework</title>
		<author>
			<persName><forename type="first">F</forename><surname>Bellifemine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Bergenti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Caire</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Poggi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Multi-Agent Programming</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="125" to="147" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Jess The Rule Engine for the Java Platform Version</title>
		<author>
			<persName><forename type="first">E</forename><surname>Friedman-Hill</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="1" to="2" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Trust Management Towards Service-Oriented Applications</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Wong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Varadharajan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The IEEE International Conference on e-Business engineering (ICEBE</title>
				<imprint>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="129" to="146" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">APES: Anonymity and Privacy in Electronic Services</title>
		<author>
			<persName><forename type="first">U</forename><surname>Flegel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Information Security</title>
				<imprint>
			<publisher>Springer US</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="171" to="176" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
