5,556 research outputs found
Recommended from our members
A multi-agent architecture for electronic payment
The Internet has brought about innumerable changes to the way enterprises do business. An essential problem to be solved before the widespread commercial use of the Internet is to provide a trustworthy solution for electronic payment. We propose a multi-agent mediated electronic payment architecture in this paper. It is aimed at providing an agent-based approach to accommodate multiple e-payment schemes. Through a layered design of the payment structure and a well-defined uniform payment interface, the architecture shows good scalability. When a new e-payment scheme or implementation is available, it can be plugged into the framework easily. In addition, we construct a framework allowing multiple agents to work cooperatively to realize automation of electronic payment. A prototype has been built to illustrate the functionality of this design. Finally we discuss the security issues
Recommended from our members
A modularized electronic payment system for agent-based e-commerce
With the explosive growth of the Internet, electronic-commerce (e-commerce) is an increasingly important segment of commercial activities on the web. The Secure Agent Fabrication, Evolution & Roaming (SAFER) architecture was proposed to further facilitate e-commerce using agent technology. In this paper, the electronic payment aspect of SAFER will be explored. The Secure Electronic Transaction (SET) protocol and E-Cash were selected as the bases for the electronic payment system implementation. The various modules of the payment system and how they interface with each other are shown. An extensible implementation done using JavaTM will also be elaborated. This application incorporates agent roaming functionality and the ability to conduct e-commerce transactions and carry out intelligent e-payment procedures
A Factory-based Approach to Support E-commerce Agent Fabrication
With the development of Internet computing and software agent technologies, agent-based e-commerce is emerging. How to create agents for e-commerce applications has become an important issue along the way to success. We propose a factory-based approach to support agent fabrication in e-commerce and elaborate a design based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) framework. The details of agent fabrication, modular agent structure, agent life cycle, as well as advantages of agent fabrication are presented. Product-brokering agent is employed as a practical agent type to demonstrate our design and Java-based implementation
Agent fabrication and its implementation for agent-based electronic commerce
In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications
M-Commerce Implementation in Nigeria: Trends and Issues
Nigeria was described as the fastest growing telecoms nation in Africa and the third in the World. The country had experienced a phenomenal growth from a teledensity of 0.49 in 2000 to 25.22 in 2007. This trend has brought about a monumental development in the major sectors of the economy, such as banking, telecoms and commerce in general.
This paper presents the level of adoption of ICT in the banking sector and investigates the prospects of m-Commerce in Nigeria based on strengths, weaknesses, opportunities and threats (SWOT) analysis.
Findings revealed that all banks in Nigeria offer e-Banking services and about 52% of the offer some forms of m-Banking services. The banks and the telecoms operators have enormous potentials and opportunities for m-Commerce but the level of patronage, quality of cell phones, lack of basic infrastructure and security issues pose a major threat to its wide scale implementation
Migration control for mobile agents based on passport and visa
Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-commerce framework. P/V not only serves as up-to-date digital credentials for agent-host authentication, but also provides effective security mechanisms for online communities to control mobile agent migration. Protection for mobile agents, network hosts, and online communities is enhanced using P/V. We discuss the design issues in details and evaluate the implementation of the proposed system
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Business models for deployment and operation of femtocell networks; - Are new cooperation strategies needed for mobile operators?
In this paper we discuss different business models for deployment and operation of femtocell networks intended for provisioning of public mobile broad band access services. In these types of business cases the operators use femtocells in order to reduce investments in "more costly" macro networks since the traffic can be "offloaded" to "less costly" femtocell networks. This is in contrast to the many business cases presented in Femtoforum where femtocells mainly are discussed as a solution to improve indoor coverage for voice services in homes and small offices, usually for closed user groups The main question discussed in this paper is if "operators need to consider new forms of cooperation strategies in order to enable large scale deployment of femtocells for public access?" By looking into existing solutions for indoor wireless access services we claim that the answer is both "Yes" and "No". No, since many types of cooperation are already in place for indoor deployment. Yes, because mobile operators need to re-think the femtocell specific business models, from approaches based on singe operator networks to different forms of cooperation involving multi-operator solutions, e.g. roaming and network sharing. --
Caps, apps and other mobile traps
This report outlines the major policy and legal issues on mobile phone ownership for children and young people
- âŠ