L. Lois-de-convenance, Nous dénissons un ensemble de lois qui dénissent une transmission convenable, ou appropriée (Appropriateness-laws ou A-laws en anglais) Ces lois sont exprimées en utilisant les prédicats présentés ci-avant

. La-loi-fitcontext, +M) déclare que si I est l'information contenue dans le message M, et que le rôle-contexte est C, la transmission est convenable si l'agent croit que C est compatible avec I

P. La and . Est-valide-si-le-message-respecte-les-a-laws, La PEN4 est satisfaite si l'expéditeur est digne de conance. La PEN5 vérie que le message ait bien été signé correctement (un maillon a bien été ajouté à la chaine) Notons qu'à la réception, les PENs 1 et 2 ne sont pas vériées car supposées toujours vraies (l'agent a conance en lui même notamment)

P. La and A. Sera-satisfaite-si-le-message-respecte-les, La PEN2 est vraie lorsque le destinataire est digne de conance. Appendix A. PrivaCIAS: French Summary On peut remarquer que le score du système commence à chuter autour de 30 pour cent de SimpleAgents, Nous choisissons alors ce pourcentage comme référence pour les expériences suivantes

. Comme-on-peut-le-constater-sur-le-tableau, toutes les PENs, excepté la PEN5 on un impact positif sur le score du système (elles font baisser le score quand elles sont désactivées). La PEN5 n'a pas d'eet du fait de l'implémentation de

. Le-modèle-n-'est-pas-contraignant-pour-le-développeur, Ainsi, tout développeur pourra proposer son agent PEA, tant que celui-ci respecte les PENs. Si ce n'est pas le cas, son agent sera exclu par les autres comme les expériences l'ont montré

L. Krupa and . Vercouter, Handling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework

Y. Krupa and L. Vercouter, Contrôle social de la privacité selon l'intégrité contextuelle dans les systèmes décentralisés, Journées Francophones

Y. Krupa and L. Vercouter, Contextual Integrity and Privacy Enforcing Norms for Virtual Communities, 11th International Workshop on Coordination , Organization, Institutions and Norms in Multi-Agent Systems (COIN@ MALLOW2010)

Y. Krupa, J. Sabater-mir, and L. Vercouter, Handling Privacy as Contextual Integrity in Virtual Communities, WIVE, vol.2010

L. Krupa, J. F. Vercouter, A. Hubner, and . Herzig, Trust based evaluation of wikipedia's contributors. Engineering Societies in the Agents World X

Y. Krupa, J. F. Hubner, and L. Vercouter, Extending the Comparison Eciency of the ART Testbed, Proceedings of the First International Conference on Reputation: Theory and Technology -ICORE 09

]. D. Abril, G. Navarro-arribas, and V. Torra, Towards semantic microaggregation of categorical data for condential documents, Bibliography Modeling Decisions for Articial Intelligence, p.266276, 2010.

]. A. Acquisti and R. Gross, Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook, Lecture Notes in Computer Science, vol.4258, issue.37, pp.36-53, 2006.
DOI : 10.1007/11957454_3

]. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Proceedings of the 28th international conference on Very Large Data Bases, pp.143154-143194, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

A. , ]. R. Albert, and A. L. Barabási, Topology of evolving networks: local events and universality. Physical review letters, p.52345237, 2000.

]. H. Aldewereld, Autonomy vs. Conformity: An Institutional Perspective on Norms and Protocols, The Knowledge Engineering Review, vol.24, issue.04, 2007.
DOI : 10.1017/S0269888909990257

]. G. Anderman and M. Rogers, Translation today: trends and perspectives, Multilingual Matters Ltd, 2003.

]. A. Antón, Q. He, and D. L. Baumer, The Complexity Underlying JetBlue's Privacy Policy Violations, Complexity, 2003.

]. S. Baase, Gift of Fire: Social, Legal, and Ethical Issues for Computing and the Internet, 2007.

]. A. Barabási and R. Albert, Emergence of scaling in random networks, science, vol.286, issue.5439, p.509512, 1999.

]. A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, Privacy and contextual integrity: framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P'06), p.184198, 2006.
DOI : 10.1109/SP.2006.32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.1610

]. D. Bell and L. J. Lapadula, Secure computer systems: Mathematical foundations. Rapport technique, 1973.

]. P. Bradwell and N. Gallagher, The new politics of personal information . Demos report, 2007.

]. J. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, p.110, 2005.
DOI : 10.1145/1063979.1063998

]. A. Ciortea, Modeling Relashionships for privacy Preservation in Virtual Communities, pp.15-149, 2011.

]. N. Collier, Repast: An extensible framework for agent simulation. The University of Chicago's, Social Science Research, vol.36, 2003.

]. L. Crépin, Les Systèmes Multi-Agents Hippocratiques, pp.41-42, 2009.

]. J. Delgado, J. M. Pujol, and R. Sanguesa, Emergence of coordination in scale-free networks, Web Intelligence and Agent Systems, vol.1, issue.2, p.131138, 2003.

]. V. Dignum and H. Aldewereld, OperettA: Organization-oriented development environment, Proceedings of the 3rd International workshop on Languages, Methodologies and Development Tools for Multiagent Systems (LADS2010@ Mallow), p.189, 2010.

. Ameli, An agent-based middleware for electronic institutions, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, pp.236243-62, 2004.

]. R. Falcone and C. Castelfranchi, Social trust: a cognitive approach . Trust and deception in virtual societies table of contents, p.5590, 2001.

]. D. Ferraiolo, J. Cugini, and D. R. Kuhn, Role-based access control (RBAC): Features and motivations, Proceedings of 11th Annual Computer Security Application Conference, pp.24148-24181, 1995.

]. J. Fogel and E. Nehmad, Internet social network communities: Risk taking, trust, and privacy concerns, Computers in Human Behavior, vol.25, issue.1, p.153160, 2009.
DOI : 10.1016/j.chb.2008.08.006

]. B. Gâteau, O. Boissier, D. Khadraoui, and E. Dubois, Controlling an interactive game with a multi-agent based normative organisational model. Coordination, Organizations, Institutions, and Norms in Agent Systems II, pp.86100-62, 2007.

]. T. Grandison and M. Sloman, Trust management tools for internet applications. Trust Management, p.10711071, 2003.

]. J. Grimmelmann, Facebook and the social dynamics of privacy, Iowa Law Review, vol.95, issue.16, pp.152-164, 2008.

]. A. Grizard, L. Vercouter, T. Stratulat, and G. Muller, A peer-topeer normative system to achieve social order. Coordination, organizations , institutions, and norms in agent systems II, p.274289, 2007.

]. J. Hubner, J. S. Sichman, and O. Boissier, A Model for the Structural, Functional, and Deontic Specication of Organizations in Multiagent Systems, Lecture Notes in Computer Science, p.118128, 2002.

]. J. Hübner, J. S. Sichman, and O. Boissier, Moise+: towards a structural, functional, and deontic model for mas organization, Proceedings of the rst international joint conference on Autonomous agents and multiagent systems: part 1, pp.501502-62, 2002.

]. J. Hübner, J. Sichman, and O. Boissier, S-Moise+: A Middleware for Developing Organised Multi-agent Systems. Coordination, organizations , institutions, and norms in multi-agent systems, p.6477, 2006.

]. J. Hubner, J. S. Sichman, and O. Boissier, Developing organised multiagent systems using the MOISE+ model: programming issues at the system and agent levels, International Journal of Agent-Oriented Software Engineering, vol.1, issue.3, p.370395, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00405533

]. J. Hübner, E. Lorini, A. Herzig, and L. Vercouter, From cognitive trust theories to computational trust, Proc. of the Twelfth Workshop Trust in Agent Societies at AAMAS, p.5567, 2009.

]. J. Hübner, O. Boissier, R. Kitio, and A. Ricci, Instrumenting multi-agent organisations with organisational artifacts and agents, Autonomous Agents and Multi-Agent Systems, vol.20, issue.3, p.369400, 2010.

]. C. Jernigan and B. F. Mistree, Gaydar: Facebook friendships expose sexual orientation, First Monday, vol.14, issue.10, 2009.
DOI : 10.5210/fm.v14i10.2611

URL : http://doi.org/10.5210/fm.v14i10.2611

]. R. Kitio, O. Boissier, J. F. Hübner, and A. Ricci, Organisational Artifacts and Agents for Open Multi-Agent Organisations: ???Giving the Power Back to the Agents???, Proceedings of the 2007 international conference on Bibliography 191, 2007.
DOI : 10.1007/978-3-540-79003-7_13

URL : https://hal.archives-ouvertes.fr/hal-00405580

]. L. Korba and S. Kenny, Towards Meeting the Privacy Challenge: Adapting DRM, Conjunction with the Ninth ACM Conference on Computer and Communications Security, 2002.
DOI : 10.1007/978-3-540-44993-5_8

]. Y. Krupa, L. Vercouter, J. Hübner, and A. Herzig, Trust based evaluation of wikipedia's contributors. Engineering Societies in the Agents World X, pp.148161-65, 2009.

]. E. Lorini and R. Demolombe, Trust and Norms in the Context of Computer Security: A Logical Formalization, Deontic Logic in Computer Science, p.5064, 2008.
DOI : 10.1007/978-3-540-70525-3_6

]. M. Mont, S. Pearson, and P. Bramhall, Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.377382-377428, 2003.
DOI : 10.1109/DEXA.2003.1232051

]. L. Nardin, A. Brandao, J. Sichman, and L. Vercouter, An Ontology Mapping Service to Support Agent Reputation Models Interoperability. À paraitre dans : Workshop Trust in agent societies, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00405598

]. H. Nissenbaum, Privacy in context: Technology, policy, and the integrity of social life, pp.18-20, 2010.

]. G. Piolle, Agents utilisateurs pour la protection des données personnelles: modélisation logique et outils informatiques, Bibliography, vol.168, p.47, 2009.

]. R. Popa, H. Balakrishnan, and A. J. Blumberg, VPriv: Protecting privacy in location-based vehicular services, Proceedings of the 18th conference on USENIX security symposium, p.335350, 2009.

]. J. Reagle and L. F. Cranor, The platform for privacy preferences, Communications of the ACM, vol.42, issue.2, 1999.
DOI : 10.1145/293411.293455

]. R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications, vol.21, issue.87, p.31, 1978.
DOI : 10.1145/359340.359342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588

]. R. Rivest, The MD5 Message-Digest Algorithm. Distribution, 1992, 1992.

]. J. Sabater and C. Sierra, Review on Computational Trust and Reputation Models, Artificial Intelligence Review, vol.18, issue.4, p.3360, 2005.
DOI : 10.1007/s10462-004-0041-5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.519.2932

]. J. Sabater, M. Paolucci, and R. Conte, Repage: REPutation and ImAGE Among Limited Autonomous Partners, Journal of Articial Societies and Social Simulation, vol.9, issue.2, p.3, 2006.

]. J. Saunier and F. Balbo, Regulated multi-party communications and context awareness through the environment, Multiagent and Grid Systems, vol.5, issue.1, p.7591, 2009.
DOI : 10.3233/MGS-2009-0120

]. B. Savarimuthu, S. Craneeld, G. Boella, P. Noriega, G. Pigozzi et al., A categorization of simulation works on norms, Normative Multi-Agent Systems, 2009.

]. D. Solove-2007 and . Solove, I've Got Nothing to Hide and Other Misunderstandings of Privacy, San Diego L. Rev, vol.44, pp.745-756, 2007.

]. Daniel, J. Solove, and U. Privacy, Understanding privacy, GWU Legal Studies Research Paper No, vol.420, issue.420, 2008.

]. L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, p.557570, 2002.
DOI : 10.1142/S0218488502001648

]. R. Tuomela, The importance of us: A philosophical study of basic social notions, p.58, 1995.

]. R. Tuomela, Cooperation: A philosophical study, 2000.

L. Vercouter and G. L. Muller, L.I.A.R.: ACHIEVING SOCIAL CONTROL IN OPEN AND DECENTRALIZED MULTIAGENT SYSTEMS, Applied Artificial Intelligence, vol.7, issue.8, p.723768, 2010.
DOI : 10.1093/mind/LX.237.1

URL : https://hal.archives-ouvertes.fr/hal-01405939

]. D. Villatoro, S. Sen, and J. Sabater-mir, Topology and memory eect on convention emergence, Proceedings of the, 2009.
DOI : 10.1109/wi-iat.2009.155

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.463.9232

]. D. Watts and S. H. Strogatz, Collective dynamics of`smallof`smallworld'networks, nature, vol.393, issue.6684, pp.440442-194, 1998.

]. A. Westin, Social and Political Dimensions of Privacy, Journal of Social Issues, vol.90, issue.4, p.431453, 2003.
DOI : 10.1111/1540-4560.00072

]. C. Yeung, I. Liccardi, K. Lu, O. Seneviratne, and T. Berners-lee, Decentralization: The future of online social networking, W3C Workshop on the Future of Social Networking Position Papers, 2009.

]. G. Zacharia, Collaborative reputation mechanisms for online communities. Master's thesis, Massachusetts Institute of Technology, 1999.

]. P. Zimmermann, The ocial pgp user's guide, p.31, 1995.

Y. Krupa and P. , Privacy as Contextual Integrity in Decentralized Multi-Agent Systems Specialité : Informatique Mots Clefs : privacité, intégrité contextuelle, réseaux sociaux, systèmes multiagents

. Dans-cette-thèse, intégrité contextuelle, qui propose de redénir la notion de violation de privacité Selon cette théorie, toute transmission peut déclencher une violation de privacité suivant le contexte dans lequel elle a lieu Cette thèse utilise la théorie de l'intégrité contextuelle an de proposer un modèle de protection de la privacité pour les systèmes multiagents décentralisés : le modèle PrivaCIAS. An de contrôler les agents dans le système, le modèle PrivaCIAS fournit un ensemble de normes qui permet la mise en place d'un contrôle social basé sur la conance. Le modèle donne le contrôle aux agents pour constater les violations (selon l'intégrité contextuelle), p.20120930223300

Y. Krupa and P. , Privacy as Contextual Integrity in Decentralized Multi-Agent Systems Major in Computer Science Keywords: Privacy, Contextual Integrity, Social Networks, Multi-agent Systems, Open Decentralized Networks Abstract: Contextual Integrity has been proposed to dene privacy in an unusual way