24,223 research outputs found
Migration control for mobile agents based on passport and visa
Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-commerce framework. P/V not only serves as up-to-date digital credentials for agent-host authentication, but also provides effective security mechanisms for online communities to control mobile agent migration. Protection for mobile agents, network hosts, and online communities is enhanced using P/V. We discuss the design issues in details and evaluate the implementation of the proposed system
Recommended from our members
Integrity protection for code-on-demand mobile agents in e-commerce
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection
Fairs for e-commerce: the benefits of aggregating buyers and sellers
In recent years, many new and interesting models of successful online
business have been developed. Many of these are based on the competition
between users, such as online auctions, where the product price is not fixed
and tends to rise. Other models, including group-buying, are based on
cooperation between users, characterized by a dynamic price of the product that
tends to go down. There is not yet a business model in which both sellers and
buyers are grouped in order to negotiate on a specific product or service. The
present study investigates a new extension of the group-buying model, called
fair, which allows aggregation of demand and supply for price optimization, in
a cooperative manner. Additionally, our system also aggregates products and
destinations for shipping optimization. We introduced the following new
relevant input parameters in order to implement a double-side aggregation: (a)
price-quantity curves provided by the seller; (b) waiting time, that is, the
longer buyers wait, the greater discount they get; (c) payment time, which
determines if the buyer pays before, during or after receiving the product; (d)
the distance between the place where products are available and the place of
shipment, provided in advance by the buyer or dynamically suggested by the
system. To analyze the proposed model we implemented a system prototype and a
simulator that allow to study effects of changing some input parameters. We
analyzed the dynamic price model in fairs having one single seller and a
combination of selected sellers. The results are very encouraging and motivate
further investigation on this topic
Trust and Privacy Permissions for an Ambient World
Ambient intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will trust such systems and at the same time achieve and maintain privacy. As a result, we have recently conducted a wide reaching study of people’s attitudes to potential AmI scenarios with a view to eliciting their privacy concerns. This chapter describes recent research related to privacy and trust with regard to ambient technology. The method used in the study is described and findings discussed
Implementing an Agent Trade Server
An experimental server for stock trading autonomous agents is presented and
made available, together with an agent shell for swift development. The server,
written in Java, was implemented as proof-of-concept for an agent trade server
for a real financial exchange.Comment: 14 pages, 7 figures, intended for B/W printin
- …