[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/646616.697094guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Secure Communication for Secure Agent-Based Electronic Commerce Applications

Published: 01 January 2001 Publication History

Abstract

Although electronic commerce is a relatively new concept, it has already become a normal aspect of our daily life. The software agent technology is also relatively new. In the area of electronic commerce, software agents could be used for example to search for the lowest prices and the best services, to buy goods on behalf of a user, etc. These applications involve a number of security issues, such as communications security, system security, and application security, that have to be solved. This paper describes how communications security is added to a lightweight agent framework. Secure agent-based electronic commerce applications require communications security services. Adding these services is a first basis and an important enabler for the framework in order to be used for secure electronic commerce applications.

References

[1]
Dartmouth College. D'Agents. http://agent.cs.dartmouth.edu/
[2]
Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246 (1999).
[3]
Doraswamy, N., Harkins, D.: IPSec The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice-Hall (1999).
[4]
Finin, T., Labrou, Y., Mayfield, J.: KQML as an agent communication language. In: Bradshaw, J. (ed.): Software Agents (1997).
[5]
He, Q., Sycara, K. P.: Towards a Secure Agent Society. ACM AA'98 Workshop on Deception, Fraud and Trust in Agent Societies (1998).
[6]
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998).
[7]
IAIK. Java crypto software. http://jcewww.iaik.tu-graz.ac.at/
[8]
IBM. Aglets. http://www.trl.ibm.co.jp/aglets/
[9]
Kindborg, M., Åberg, J., and Shahmehri, N.: A lightweight agent framework for interactive multi-agent applications. In: Proceedings of Fourth International Conference on the Practical Application of Intelligent Agents and Multi-Agents (1999) http://www.ida.liu.se/~mikki/PAAM99/
[10]
Kohl, J., Neuman, C.: The Kerberos Network Authentication Service V5. RFC 1510 (1993).
[11]
Stanford University. JATLite. http://java.stanford.edu/
[12]
Sun Microsystems. Java. http://java.sun.com/
[13]
Sun. Java Cryptography Extension (JCE). http://java.sun.com/products/jce/
[14]
Sun. Java Secure Socket Extension (JSSE). http://java.sun.com/products/jsse/
[15]
Necula, G., Lee, P.: Safe, Untrusted Agents Using Proof-Carrying Code. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998).
[16]
Riordan, J., Schneier, B.: Environmental Key Generation Towards Clueless Agents. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998).
[17]
SESAME. https://www.cosic.esat.kuleuven.ac.be/sesame/
[18]
Vigna, G.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998).

Cited By

View all
  • (2003)(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutionsACM Transactions on Internet Technology10.1145/643477.6434793:1(28-48)Online publication date: 1-Feb-2003
  1. Secure Communication for Secure Agent-Based Electronic Commerce Applications

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
    January 2001
    346 pages
    ISBN:3540419349

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 January 2001

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 02 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2003)(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutionsACM Transactions on Internet Technology10.1145/643477.6434793:1(28-48)Online publication date: 1-Feb-2003

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media