CHAPTER 8 References [1] Mark S. Ackerman and Laysia Palen, "The Zephyr Help Instance: Promoting Ongoing Activity in a CSCW System," Proceedings of the Association of Computing Machinery's Conference on Human Factors in Computing Systems (CHI `96), pp. 269-275, ACM Press, Vancouver, British Columbia, Canada, 1996. [2] Allan Robert Adler, ed., Litigation under the Federal Open Government Laws, 19th edition, American Civil Liberties Union Foundation, 1995. [3] Philip E. Agre, mod., RRE@weber.ucsd.edu mailing list,{http://dlis.gseis.ucla.edu/ people/pagre/rre.html} [4] Philip E.Agre and Marc Rotenberg, eds., Technology and Privacy: The New Landscape, MIT Press, 1997. [5] Ellen Alderman and Caroline Kennedy, The Right to Privacy, Knopf, 1995. [6] R. J. Anderson, "Why Cryptosystems Fail," Communications of the ACM, 37(11):32-40, November 1994. [7] The Apache Group, {http://www.apache.org} [8] Julian Assange, admin, Best-of-Security@suburbia.net mailing list archives. [9] Associated Press newswire, April 17, 1998. [10] Andre Bacard, Anonymous Remailer FAQ, {http://www.well.com/user/abacard/ remail.html} [11] Patrick Ball, Paul Kobrak, and Herbert F. Spirer, State Violence in Guatemala, 1960-1996: A Quantitative Reflection, American Association for the Advancement of Science, Washington, DC, 1999. [12] T. Berners-Lee, R. Fielding, and H. Frystyk, "Hypertext Transport Protocol -- HTTP/1.0," RFC1945, May 1996 {ftp://ftp.isi.edu/in-notes/rfc1945.txt} [13] Marshall Berman, All That is Solid Melts Into Air, Simon & Schuster, 1982. [14] Henry Campbell Black, Joseph R. Nolan, and Martina N. Alibrandi, Black's Law Dictionary, West/Wadsworth, 1990. [15] Matt Blaze, Whitfield Diffie, Ronald L. Rivest, Bruce Schneier, Tsotomu Shimomura, Eric Thompson, and Michael Wiener, "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security," Report by an Ad-Hoc Group of Page 2 120 Cryptographers and Computer Scientists, Business Software Alliance meeting, Chicago, IL, November 20, 1995. [16] Jeffrey Bradshaw, ed., Software Agents, AAAI/MIT Press, Spring 1996. [17] Anne Wells Branscomb, Who Owns Information? From Privacy to Public Access, BasicBooks, a division of HarperCollins Publishers, Inc., 1994. [18] Louis M. Branscomb and James H. Keller, Converging Infrastructures: Intelligent Transportation and the National Information Infrastructure, the Harvard Information Infrastructure Project, MIT Press, 1996. [19] Rodney A. Brooks and Pattie Maes, eds., Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, MIT Press, 1994. [20] Amy Bruckman, "Gender Swapping on the Internet," INET `93, San Francisco, August 1993. [21] CALEA: Communications Assistance for Law Enforcement Act, 47 U.S.C. §§ 1001, et seq. (1994). [22] Ron Canetti, Cynthia Dwork, Moni Naor, and Rafi Ostrovsky, "Deniable Encryption," Proceedings of the Workshop on Security in Communications Networks, Hotel Cappuccini, Amalfi, Italy, September 16-17, 1996 {http://www.unisa.it/SCN96/papers/CDNO.ps} [23] David Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, 23(2), February, 1981. [24] D. D. Clark, Computers at Risk: Safe Computing in the Information Age, [Final report of the System Security Study Committee], National Research Council, National Academy Press, 1990. [25] Scott Clearwater, Market-Based Control: A Paradigm for Distributed Resource Allocation, World Scientific Publishing, 1996. [26] C|NET news.com, April 16, 1999, {http://www.news.com/News/Item/ 0%2C4%2C0-34889%2C00.html?st.ne.180.head} [27] Michael Coen, "SodaBot: A Software Agent Environment and Construction System," MIT AI Lab TR 1493, June 1994. [28] Philip R. Cohen and Hector J. Levesque, "Communicative Actions for Artificial Agents," [a KQML critique], Proceedings of the First International Conference on Multiagent Systems, Victor Lesser, MIT Press, 1995. [29] Gary Cornell and Cay Horstmann, Core Java, SunSoft Press, 1996. [30] Barry Crabtree and Nick Jennings, eds., Proceedings of the First International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agent Technology, The Practical Application Company, 1996. [31] Kevin Crowston and Thomas Malone, "Intelligent Software Agents," BYTE, pp.267-271, December 1988. [32] Matt Curtin and Justin Dolske, "A Brute Force Search of DES Keyspace," ;login: The Usenix Magazine, May 1998. [33] Pavel Curtis, "Mudding: Social Phenomena in Text-Based Virtual Realities," Proceedings of DIAC '92 . [34] K. Dam, Cryptography's Role in Securing the Information Society (aka the CRISIS report), [Final report of the Cryptographic Policy Study Committee], National Research Council, National Academy Press, 1996. Page 3 121 [35] Drew Dean, Edward W. Felten, and Dan S. Wallach, "Java Security: From HotJava to Netscape and Beyond," Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8, 1996. [36] C. A. Dellafera, M. W. Eichin, R. S. French, D. C. Jedlinksy, J. T. Kohl, and W. E. Sommerfeld, "The Zephyr Notification System," Proceedings of the Winter 1988 Usenix Technical Conference, February 1988, pp. 213-219. [37] Y. Demazeau and J. P. Müller, eds., Decentralized AI, Volumes 1, 2, and 3, North-Holland, 1991, 1992, and 1993. [38] Keith Decker, Katia Sycara, and Mike Williamson, "Modeling Information Agents: Advertisements, Organizational Roles, and Dynamic Behavior," AAAI-96 Workshop on Agent Modelin g, March 1996. [39] L. Dent, J. McDermott Boticario, T. Mitchell, and D. Zabowski, "A Personal Learning Apprentice," Proceedings of the National Conference on Artificial Intelligence, MIT Press, 1992. [40] K. Eric Drexler and Mark S. Miller, "Incentive Engineering for Computational Resource Management," The Ecology of Computation, B. A. Huberman, ed., Elsevier Science Publishers, B. V. (North-Holland), 1988. [41] Electric Classifieds, Inc., {http://www.match.com/}. [42] Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics, & Chip Design-How Federal Agencies Subvert Privacy, O'Reilly & Associates, Inc., May 1998. [43] Cupid Networks, Inc., {http://www.yenta.email.net/} [44] Jonathan Emord, Freedom, Technology, and the First Amendment, Pacific Research Institute for Public Policy, 1991. [45] Oren Etzioni and Thomas Mitchell, Proceedings of the AAAI Spring Symposium on Interface Agents, Stanford, 1994. [46] Oren Etzioni and Daniel Weld, "A Softbot-Based Interface to the Internet," Communications of the ACM, July 1994. [47] European Communities, Directive on the protection of personal data (9546/EC), {http://europa.eu.int/comm/dg15/en/media/dataprot/news/925.htm}, {http://europa.eu.int/comm/dg15/en/media/dataprot/law/dir9546.htm} [48] EU Report A4-0141/99 on the draft Joint Action, adopted by the Council on the basis of Article K.3 of the Treaty on European Union, to combat child pornography on the Internet (10850/5/98 - C4-0674/98 - 98/0917(CNS)), Committee on Civil Liberties and Internal Affairs, Rapporteur: Gerhard Schmid. [49] Remy Evard, "Collaborative Networked Communication: MUDs as Systems Tools," Proceedings of the Seventh Systems Administration Conference (LISA VII), USENIX, Monterey, CA, November 1993. [50] Export Administration Regulations, 15 C. F. R. §§730-74. [51] Dave Farber, mod., Interesting-People@eff.org mailing list. [52] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1," RFC2068, January 1997 {ftp://ftp.isi.edu/in-notes/rfc2068.txt} [53] Paul Feldman and Silvio Micali, "Optimal Algorithms for Byzantine Agreement," 20th STOC, pp.148-161, ACM, New York, 1988. [54] Leonard N. Foner, "Clustering and Information Sharing in an Ecology of Cooperating Agents," AAAI Spring Symposium on Information Gathering from Distributed, Heterogeneous Environments, Knoblock & Levy, eds., Stanford, CA, March, 1995. Page 4 122 [55] Leonard N. Foner, "Clustering and Information Sharing in an Ecology of Cooperating Agents, or How to Gossip without Spilling the Beans," Proceedings of the Conference on Computers, Freedom, and Privacy '95 Student Paper Winner, Burlingame, CA, 1995. [56] Leonard N. Foner, "A Multi-Agent System for Matchmaking," Proceedings of the First International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agent Technology, Barry Crabtree and Nick Jennings, eds., The Practical Application Company, 1996. [57] Leonard N. Foner, "Paying Attention to What's Important: Using Focus of Attention to Improve Unsupervised Learning," MIT Media lab SM Thesis, June 1994. [58] Leonard N. Foner, "A Security Architecture for a Multi-Agent Matchmaker," Proceedings of the Second International Conference on Multi-Agent Systems (ICMAS `96), Keihanna Plaza, Kansai Science City, Japan, December 1996. [59] Leonard N. Foner, "Entertaining Agents: A Sociological Case Study," Proceedings of the First International Conference on Autonomous Agents (AA `97), W. Lewis Johnson, ed., Marina del Rey, 1997. [60] Leonard N. Foner, "What's an Agent, Anyway? A Sociological Case Study," Agents Memo 93-01, {http://foner.www.media.mit.edu/people/foner/Julia/} [61] Leonard N. Foner and I. Barry Crabtree, "Multi-Agent Matchmaking," BT Technology Journal, 14 (4), pp. 115+, October 1996. [62] Leonard N. Foner and Pattie Maes, "Paying Attention to What's Important: Using Focus of Attention to Improve Unsupervised Learning," From Animals to Animats 3: Proceedings of the Third International Conference on Simulation of Adaptive Behavior (SAB `94), Dave Cliff, Philip Husbands, Jean-Arcady Meyer, and Steward W. Wilson, eds., MIT Press, 1994. [63] A. Freier, P. Karlton, and P. Kocher, "The SSL Protocol Version 3.0," IETF draft, March 4, 1996, {ftp://ftp.netscape.com/pub/review/ssl-spec.tar.Z} [64] Charles Fried, Privacy 77 Yale Law Journal 475 (1968). [65] A. Michael Froomkin, "Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases", 15 U. Pittsburgh Journal of Law and Commerce 395 (1996). [66] Global Internet Liberty Campaign (GILC) Mixmaster remailer interface, {http://www.gilc.org/speech/anonymous/remailer.html} [67] Ian Goldberg, "Netscape SSL Implementation Cracked!" message to cypherpunks on September 17, 1995 at 21:41:01 PST. [68] Li Gong, "An Overview of Enclaves 1.0," SRI Computer Science Lab, SRI-CSL-96-01. [69] Li Gong and P. Syverson, "Fail-Stop Protocols: An Approach to Designing Secure Protocols," Proceedings of the Fifth IFIP Working Conference on Dependable Computing for Critical Applications, Dependable Computing and Fault-Tolerant Systems, Urbana-Champaign, pp.44-55, Springer-Verlag, September 1995. [70] James Gosling and H. McGilton, The Java Language Environment, Sun Microsystems, May 1995. {http://java.sun.com/whitePaper/javawhitepaper_1.html} [71] Griswald v. Connecticut, 381 U.S. 479 (1965). [72] Laura J. Gurak, Persuasion and Privacy and Cyberspace: The Online Protests over Lotus Marketplace and the Clipper Chip, Yale University Press, 1997. Page 5 123 [73] Peter Gutmann, "Secure Deletion of Data from Magnetic and Solid-State Memory," Proceedings of the Sixth Usenet Security Symposium, San Jose, CA, July 22-25, 1996. [74] The Harvest Project, {http://harvest.transarc.com/} [75] Bennett Haselton, Peacefire, {http://www.peacefire.org/} [76] Martin Hellman, "DES will be Totally Insecure Within Ten Years," IEEE Spectrum, 16 (7), pp. 32-39, July 1979. [77] Johan Helsingius, website: {http://www.penet.fi/}, anonymous remailer: {anon.penet.fi}, press release, {http://www.epic.org/privacy/internet/anon_closure.html} [78] Evan Hendricks, Trudy Hayden, and Jack D. Novik, Your Right to Privacy, an American Civil Liberties Handbook, Southern Illinois University Press, 1990. [79] W. Daniel Hillis, "Co-evolving parasites improve simulated evolution as an optimization procedure," Artificial Life II, Chris Langton, et al, eds., Addison Wesley, 1992. [80] Lance J. Hoffman, Building in Big Brother: The Cryptographic Policy Debate, Springer, 1995. [81] Douglas Hofstadter, Fluid Concepts & Creative Analogies: Computer Models of the Fundamental Mechanisms of Thought, Basic Books, 1996. [82] C. Hornig, "Standard for the Transmission of IP Datagrams over Ethernet Networks," RFC894, April 1, 1984. {ftp://ftp.isi.edu/in-notes/rfc894.txt} [83] M. R. Horton and R. Adams, "Standard for Interchange of USENET Messages," RFC1036, December 1, 1987 {ftp://ftp.isi.edu/in-notes/rfc1036.txt} [84] B. A. Huberman, ed., The Ecology of Computation, North-Holland, 1988. [85] idealab!, {http://www.free-pc.com/} [86] I. Ingemarsson and G. J. Simmons, "A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party," Advances in Cryptology -- EUROCRYPT `90 Proceedings, pp. 266-282, Springer-Verlag, 1991. [87] International Traffic in Arms Regulations, 58 Federal Register 39,280 (1993) (to be codified at 22 C.F.R.§§120-128, 130). [88] Katherine Isbister and Terre Layton, "Intelligent Agents: A Review of Current Literature," {http://www.research.microsoft.com/research/ui/persona/isbister.htm} [89] Aubrey Jaffer and Radey Shouman, SCM, {http://www-swiss.ai.mit.edu/~jaffer/ SCM.html} [90] Richard Jones and Rafael Lins, Garbage Collection: Algorithms for Automatic Dynamic Memory Management, John Wiley & Sons, 1996. [91] Henry Kautz, Al Milewski, and Selman Bart, "Agent Amplified Communication," AAAI '95 Spring Symposium Workshop Notes on Information Gathering in Distributed, Heterogeneous Environments, Stanford, CA. [92] Bert Kaliski, "Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services," RFC1424, February 10, 1993, {ftp://ftp.isi.edu/in-notes/rfc1424.txt} [93] Alan Kay, "Computer Software," Scientific American, volume 251, number 3, September, 1984. [94] Kevin Kelly, Out of Control: The New Biology of Machines, Social Systems, and the Economic World, Addison-Wesley, 1995. Page 6 124 [95] J. Kephart, "A Biologically Inspired Immune System for Computers," Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, Rod Brooks and Pattie Maes, eds., MIT Press, 1994. [96] Kenneth E. Kinnear, Jr., ed., Advances in Genetic Programming, MIT Press, 1994. [97] Rob Kling, Computerization and Controversy: Value Conflicts and Social Choices, second edition, Academic Press (San Diego), 1996. [98] Robyn Kozierok, A Learning Approach to Knowledge Acquisition for Intelligent Interface Agents, SM Thesis, MIT Department of Electrical Engineering and Computer Science, 1993. [99] Daniel Kuokka and Larry Harada, "Matchmaking for Information Agents," Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) '95, 1995. [100] Daniel Kuokka and Larry Harada, "On Using KQML for Matchmaking," Proceedings of the First International Conference on Multiagent Systems, Victor Lesser, MIT Press, 1995. [101] Jaron Lanier, "Agents of Alienation," interactions, volume 2, number 3, July 1995. [102] Chris Langton, Charles Taylor, J. Doyne Farmer, and Steen Rasmussen, eds., Artificial Life II, Addison-Wesley, 1992. [103] Yezdi Lashkari, Max Metral, and Maes Pattie, "Collaborative Interface Agents," Proceedings of the Twelfth National Conference on Artificial Intelligence, MIT Press, Cambridge, MA, 1994. [104] Ron Lee, General Counsel, National Security Agency, in an answer to a public question at Computers, Freedom, and Privacy, Cambridge, MA, March 27, 1996. [105] Tony Lesce, The Privacy Poachers: How the Government and Big Corporations Gather, Use, and Sell Information about You, Loompanics Unlimited, Port Townsend, WA, 1992. [106] Henry Lieberman, "Letizia: An Agent That Assists Web Browsing," Proceedings of the 1995 International Joint Conference on Artificial Intelligence, Montreal, Canada, August 1995. [107] Peter Ludlow, ed., High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace, MIT Press, 1996. [108] David Lyon and Elia Zureik, eds., Computers, Surveillance, and Privacy, University of Minnesota Press, 1996. [109] David Mackenzie and Tom Tromey, et al, GNU automake and autoconf, {ftp:// ftp.gnu.org/gnu/automake/ and ftp://ftp.gnu.org/gnu/autoconf} [110] MacroView Communications Corp, {http://www.sixdegrees.com/}. [111] Thomas Malone and Kevin Crowston, "Toward an Interdisciplinary Theory of Coordination," Center for Coordination Science TR 120, April, 1991. [112] Pattie Maes, "Agents that Reduce Work and Information Overload," Communications of the ACM, volume 37, number 7, ACM Press, 1994. [113] Pattie Maes, "Intelligent Software," Scientific American, volume 273, number 3, pp. 84-86, September 1995. [114] Pattie Maes and Robyn Kozierok, "Learning Interface Agents," Proceedings of AAAI'93, AAAI Press, 1993. Page 7 125 [115] Thomas Malone, Richard Fikes, Kenneth Grand, and Michael Howard, "Enterprise: A Market-like Task Scheduler for Distributed Computing Environments," The Ecology of Computation, B. A. Huberman, ed., North-Holland, 1988. [116] Michael Mauldin, "Chatterbots, TinyMUDs, and the Turing Test: Entering the Loebner Prize Competition," Proceedings of Twelfth National Conference on Artificial Intelligence (AAAI-94), Seattle, Washington, August 1994. [117] Joseph A. Maxwell, Qualitative Research Design: An Interactive Approach (Applied Social Research Methods Series), Sage Publications, 1996. [118] Tim May, "BlackNet." Private, originally-anonymous communication, later leaked to Usenet newsgroup alt.cypherpunks in 1993 and eventually acknowledged by May to be his. [119] Robert McChesney, Telecommunications, Mass Media, & Democracy: The Battle for the Control of U.S. Broadcasting, 1928-1935, Oxford University Press, 1993. [120] McIntyre v. Ohio Elections Comm'n, 115 S. Ct. 1511 (1995). [121] J. McQuillan, "Software Checksumming in the IMP and Network Reliability," RFC528 June 20, 1973, {ftp://ftp.isi.edu/in-notes/rfc528.txt} [122] Matthew B. Miles, and A. Michael Huberman, Qualitative Data Analysis: An Expanded Sourcebook, SAGE Publications, Inc., Thousand Oaks, CA, 1994. [123] George Miller, Richard Beckwith, Christiane Fellbaum, Derek Gross, and Katherine Miller, "Introduction to WordNet: An On-line Lexical Database," Princeton University Technical Report, 1993. [124] Steven E. Miller, Civilizing Cyberspace: Policy, Power, and the Information Superhighway, Addison-Wesley, 1996. [125] William Mitchell, City of Bits: Space, Place, and the Infobahn, MIT Press, 1995. [126] Janet Murray, Hamlet on the Holodeck, The Free Press, Simon & Shuster, 1997. [127] B. Clifford Neuman and Theodore Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Communications, 32(9):33-38, September 1994. [128] Peter Neumann, mod., Risks@csl.sri.com mailing list, {http://www.csl.sri.com/risksinfo.html} [129] Peter Neumann, Computer-Related Risks, Addison-Wesley, 1995. [130] Olmstead v. United States, 277 U.S. 438 (1928). [131] Marshall Pease, Robert Shostak, Leslie Lamport, "Reaching Agreement in the Presence of Faults," Journal of the ACM 27/2, pp.228-234, 1980. [132] Ithiel de Sola Pool, Technologies of Freedom, Harvard University Press, 1983. [133] M. F. Porter, "An Algorithm for Suffix Stripping," Program 14 (3) pp. 130-137, July 1980. [134] Jon Postel, "User Datagram Protocol," RFC768, August 28, 1980 {ftp://ftp.isi.edu/in-notes/rfc768.txt} [135] Jon Postel, "Transmission Control Protocol," RFC793, September 1, 1981 {ftp://ftp.isi.edu/in-notes/rfc793.txt} [136] Jon Postel and Joyce K. Reynolds, "Telnet Protocol Specification," RFC854, May 1, 1983, {ftp://ftp.isi.edu/in-notes/rfc854.txt} [137] Anton Braun Quist, Excuse Me, What Was That? Confused Recollections of Things That Didn't Go Exactly Right, Dilithium Press, 1982 . Page 8 126 [138] Thomas S. Ray, "An Approach to the Synthesis of Life," Artificial Life II, Chris Langton, Charles Taylor, J. Doyne Farmer, and Steen Rasmussen, eds., Addison-Wesley, 1992. [139] Thomas S. Ray, "A Proposal to Create a Network-Wide Biodiversity Reserve for Digital Organisms," ATR Technical Report TR-H-133, {http://www.hip.atr.co.jp/~ray/ pubs/reserves/reserves.html} [140] Recreational Software Advisory Board on the Internet (RSACi) {http://www.rsac.org/} [141] Michael K. Reiter and Aviel D. Rubin, "Crowds: Anonymity for Web Transactions," ACM TISSEC, June 1998. [142] Mitchell Resnick, Turtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds, MIT Press, 1994. [143] Doug Riecken, ed., Communications of the ACM, special issue on Intelligent Agents, volume 37, number 7, July, 1994. [144] Howard Rheingold, Virtual Community: Homesteading on the Electronic Frontier, Harperperennial Library, 1994. [145] Howard Rheingold, Virtual Reality, Simon & Schuster, 1991. [146] Bradley Rhodes, "A Continuously Running Automated Information Retrieval System," AAAI'96 Spring Symposium on Acquisition, Learning and Demonstration: Automating Tasks for Users, Gil, Birmingham, Cypher, and Pazzani, eds., AAAI Press, 1996. [147] Roe v. Wade, 410 U.S. 113 (1973). [148] Marc Rotenberg, The Privacy Law Sourcebook: United States Law, International Law, and Recent Developments, Electronic Privacy Information Center, Washington, DC, EPIC Publications, 1998. [149] Marc Rotenberg, 1996 EPIC Cryptography and Privacy Sourcebook: Documents on Wiretapping, Cryptography, the Clipper Chip, Key Escrow, and Export Controls, Electronic Privacy Information Center, Washington, DC, EPIC Publications, 1996. [150] Sage Enterprises, Inc., {http://www.planetall.com/}. [151] Sarah Schafer, "With Capital in Panic, Pizza Deliveries Soar," The Washington Post, December 19, 1998, page D1. [152] Robert W. Scheifler, James Gettys, Al Meno, and Donna Converse, X Window System: Core and Extension Protocols, X Version 11, Releases 6 and 6.1, Digital Press, 1997. [153] Jeffrey I. Schiller, private communication. [154] Ben Schneiderman, "Looking for the Bright Side of User Interface Agents," interactions, ACM Press, January 1995. [155] Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, second edition, John Wiley & Sons, 1996. [156] Bruce Schneier and David Banisar, The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age or Surveillance, Wiley Computer Publishing, 1997. [157] Philip Selznick, The Moral Commonwealth, University of California Press, 1992. [158] Secure Shell (SSH), {http://www.ssh.fi/} [159] Upendra Shardanand, Social Information Filtering for Music Recommendation, S.M. Thesis, Program in Media Arts and Sciences, 1994. Page 9 127 [160] Upendra Shardanand and Pattie Maes, "Social Information Filtering: Algorithms for Automating `Word of Mouth,'" Proceedings of CHI'95, ACM Press, 1995. [161] Christoph Schuba, Address Weaknesses in the Domain Name System, CS MS Thesis, Purdue University, CSD-TR-94-028, 1994. [162] Beerud Sheth, A Learning Approach to Personalized Information Filtering, S.M. Thesis, MIT Department of Electrical Engineering and Computer Science, 1994. [163] Beerud Sheth and Pattie Maes, "Evolving Agents for Personalized Information Filtering," Proceedings of the Ninth Conference on Artificial Intelligence for Applications, IEEE Computer Society Press, 1993. [164] Yoav Shoham, "Agent Oriented Programming," Artificial Intelligence, volume 60 number 1, pp.51-92, 1993. [165] Karl Sims, "Evolving 3D Morphology and Behavior by Competition," Artificial Life IV, Rodney A. Brooks and Pattie Maes, eds., MIT Press, 1994. [166] Douglas Smith and Robert Alexander, Fumbling the Future: How Xerox Invented, Then Ignored the First Personal Computer, William Morrow, 1988. [167] H. Jeff Smith, Managing Privacy: Information, Technology, and Corporate America, University of North Carolina Press, 1994. [168] Robert Ellis Smith, Our Vanishing Privacy, Loompanics Unlimited, Port Townsend, WA, 1993. [169] Latanya Sweeney, "Guaranteeing Anonymity when Sharing Medical Data: The Datafly System," Proceedings of the Journal of the American Medical Informatics Association, Hanley & Belfus, Inc., Washington, DC, 1997. [170] Joseph Tardo and Luis Valente, "Mobile Agent Security and Telescript," IEEE CompCon, 1996. [171] Chelliah Thirunavukkarasu, Tom Fini, and James Mayfield, "Secret Agents-A Security Architecture for the KQML Agent Communication Language," submitted to the CIKM `95 Intelligent Information Agents Workshop, Baltimore, MD, December 1995. [172] Sherry Turkle, Life on the Screen: Identity in the Age of the Internet, Simon & Shuster, 1995. [173] United States General Accounting Office, IRS Systems Security and Funding: Employee Browsing Not Being Addressed Effectively and Budget Requests for New Systems Development Not Justified, GAO report T-AIMD-97-82, April 15, 1997. PDF: {http://frwebgate.access.gpo.gov/cgi-bin/useftp.cgi?IPaddress=162.140.64.21& filename=gg99001.pdf&directory=/diskb/wais/data/gao} [174] United States Army CECOM Software Engineering Center, Rendezvous, Where Mission & Security Meet, Volume 13, Issue 10, October 1998, {http://www.sed.monmouth.army.mil/114/oct/octnews-r.htm} [175] United States Federal Privacy Act, 5 U.S.C. §552a (1974). [176] Vernor Vinge, "True Names," in True Names... And Other Dangers, Baen Books, 1987. [177] W3C Consortium, Platform for Internet Content Selection (PICS), {http://www.w3.org/PICS/} [178] The Wall Street Journal, page B1, April 11, 1995. [179] Andrew Warinner, "That Delivery Boy May Be A Spy," {http://www.xnet.com/ ~warinner/pizza.html} [180] Warren and Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890). Page 10 128 [181] The Washington Times, August 21, 1991. [182] Lauren Weinstein, Privacy-Forum@vortex.com mailing list, {http://www.vortex.com/privacy.html} [183] James White, "Telescript Technology: Mobile Agents," Software Agents, Jeffrey Bradshaw, ed., AAAI/MIT Press, 1996. [184] Michael Wiener, "Efficient DES Key Search," Advances in Cryptology: Proceedings of Crypto `93, Santa Barbara, CA, Springer-Verlag, 1994. [185] Harry F. Wolcott, Writing Up Qualitative Research, SAGE Publications, Inc., Newbury Park, CA, 1990. [186] Eric A. Young and Tim Hudson, SSLeay, {http://www.ssleay.org/} [187] Philip Zimmermann, The Official PGP User's Guide, MIT Press, 1995. [188] Joel Zumoff, "Users Manual for the SMART Information Retrieval System," Cornell Technical Report 71-95.