BSCA-P: Privacy Preserving Coalition Formation

  • Bastian Blankenburg
  • Matthias Klusch
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3550)


In the setting of cooperation of rational web service agents via coalition formation, we devise an algorithm BSCA-P to form recursively bilateral Shapley value stable coalitions. The main focus lies on privacy aspects: we show that the BSCA-P enables the formation of subgame stable and individually rational coalitions while hiding absolute coalition values and payoffs, as well as allowing for anonymous service requests and access.


Multiagent System Coalition Formation Coalition Game Cooperative Game Theory Stable Coalition 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Blankenburg, B., Dash, R.K., Ramchurn, S.D., Klusch, M., Jennings, N.R.: Trusted kernel-based coalition formation. In: Proc. 4th Int. Conf. on Autonomous Agents and Multi-Agent Systems, Utrecht, Holland (2005) (to appear)Google Scholar
  2. 2.
    Chalkiadakis, G., Boutilier, C.: Bayesian reinforcement learning for coalition formation under uncertainty. In: Proc. 3rd Int. Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), New York, USA. ACM Press, New York (2004)Google Scholar
  3. 3.
    Halpern, J., O’Neill, K.: Anonymity and information hiding in multiagent systems. Journal of Computer Security, Special Edition on CSFW 16, 75–88 (2003)Google Scholar
  4. 4.
    Kraus, S., Shehory, O., Taase, G.: The advantages of compromising in coalition formation with incomplete information. In: Proc. 3rd Int. Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), New York, USA. ACM Press, New York (2004)Google Scholar
  5. 5.
    Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)zbMATHGoogle Scholar
  6. 6.
    Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability and pseudonymity: a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(1), 96–99 (1983)CrossRefGoogle Scholar
  8. 8.
    Shapley, L.S.: A value for n-person games. In: Kuhn, H.W., Tucker, A.W. (eds.) Contributions to the Theory of Games II. Annals of Mathematics Studies, vol. 28, pp. 307–317. Princeton University Press, Princeton (1953)Google Scholar
  9. 9.
    Shehory, O., Kraus, S.: Methods for task allocation via agent coalition formation. Artificial Intelligence Journal 101(1-2), 165–200 (1998)zbMATHCrossRefMathSciNetGoogle Scholar
  10. 10.
    Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 44–54 (1997)Google Scholar
  11. 11.
    Vassileva, J., Breban, S., Horsch, M.: Agent reasoning mechanism for long-term coalitions based on decision making and trust. Computational Intelligence 4(18), 583–595 (2002)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Bastian Blankenburg
    • 1
  • Matthias Klusch
    • 1
  1. 1.DFKI – German Research Center for Artificial IntelligenceSaarbrückenGermany

Personalised recommendations