5,556 research outputs found

    A Factory-based Approach to Support E-commerce Agent Fabrication

    Get PDF
    With the development of Internet computing and software agent technologies, agent-based e-commerce is emerging. How to create agents for e-commerce applications has become an important issue along the way to success. We propose a factory-based approach to support agent fabrication in e-commerce and elaborate a design based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) framework. The details of agent fabrication, modular agent structure, agent life cycle, as well as advantages of agent fabrication are presented. Product-brokering agent is employed as a practical agent type to demonstrate our design and Java-based implementation

    Agent fabrication and its implementation for agent-based electronic commerce

    Get PDF
    In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications

    M-Commerce Implementation in Nigeria: Trends and Issues

    Get PDF
    Nigeria was described as the fastest growing telecoms nation in Africa and the third in the World. The country had experienced a phenomenal growth from a teledensity of 0.49 in 2000 to 25.22 in 2007. This trend has brought about a monumental development in the major sectors of the economy, such as banking, telecoms and commerce in general. This paper presents the level of adoption of ICT in the banking sector and investigates the prospects of m-Commerce in Nigeria based on strengths, weaknesses, opportunities and threats (SWOT) analysis. Findings revealed that all banks in Nigeria offer e-Banking services and about 52% of the offer some forms of m-Banking services. The banks and the telecoms operators have enormous potentials and opportunities for m-Commerce but the level of patronage, quality of cell phones, lack of basic infrastructure and security issues pose a major threat to its wide scale implementation

    Migration control for mobile agents based on passport and visa

    Get PDF
    Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-commerce framework. P/V not only serves as up-to-date digital credentials for agent-host authentication, but also provides effective security mechanisms for online communities to control mobile agent migration. Protection for mobile agents, network hosts, and online communities is enhanced using P/V. We discuss the design issues in details and evaluate the implementation of the proposed system

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Business models for deployment and operation of femtocell networks; - Are new cooperation strategies needed for mobile operators?

    Get PDF
    In this paper we discuss different business models for deployment and operation of femtocell networks intended for provisioning of public mobile broad band access services. In these types of business cases the operators use femtocells in order to reduce investments in "more costly" macro networks since the traffic can be "offloaded" to "less costly" femtocell networks. This is in contrast to the many business cases presented in Femtoforum where femtocells mainly are discussed as a solution to improve indoor coverage for voice services in homes and small offices, usually for closed user groups The main question discussed in this paper is if "operators need to consider new forms of cooperation strategies in order to enable large scale deployment of femtocells for public access?" By looking into existing solutions for indoor wireless access services we claim that the answer is both "Yes" and "No". No, since many types of cooperation are already in place for indoor deployment. Yes, because mobile operators need to re-think the femtocell specific business models, from approaches based on singe operator networks to different forms of cooperation involving multi-operator solutions, e.g. roaming and network sharing. --

    Caps, apps and other mobile traps

    Get PDF
    This report outlines the major policy and legal issues on mobile phone ownership for children and young people
    • 

    corecore