Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security

  • Ching Lin
  • Vijay Varadharajan
  • Yan Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3592)


Utility has become an important consideration for information security. In this paper, we show that decisions by security mechanisms, such as the authorization decisions in a mobile agent based e-commerce system, have a direct impact on the utility of the underlying system. While benevolent behaviors contribute to the utility, malicious behaviors are the causes for lost of utility. Furthermore we show that a trust enhanced security framework can be deployed to maximize the utility of the mobile agent based e-commerce systems. This is due to one of the unique features of trust enhanced security solutions – the ability to use trust evaluation to “weed out” malicious entities. This paper presents a qualitative solution for utility maximization, and paves the way for future development of quantitative solutions. Finally, we study the properties of the proposed framework through simulation and present the results of the simulated studies which confirm our intuitions about utility maximization.


Trust Model Mobile Agent Utility Maximization System Utility Malicious Behavior 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)Google Scholar
  2. 2.
    Chess, D.M.: Security issues in mobile code systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 1. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Gong, L., Ellison, G., Dageforde, M. (eds.): Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edn. Addison-Wesley PublishingCo., Inc., Reading (May 2003)Google Scholar
  4. 4.
    IEEE Security and Privacy, Vol. 3(1), Economics of Information Security. IEEE Computer Society (2005)Google Scholar
  5. 5.
    Jansen, W.: Countermeasures for mobile agent security. Comupter Communications, Special Issue on Advances of Network Security (November 2000)Google Scholar
  6. 6.
    Josang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)MathSciNetGoogle Scholar
  7. 7.
    Lange, D.B., Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley, Reading (1998)Google Scholar
  8. 8.
    Lin, C., Varadharajan, V., Wang, Y., Mu, Y.: On the design of a new trust model for mobile agent security. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 60–69. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust enhanced security for mobile agents. In: To appear in 7th International IEEE Conference on E-Commerce Technology 2005, Technische Universität München, Germany, July 19-22, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  10. 10.
    Marsh, S.: Formalising trust as a computational concept. PhD thesis, University of Stirling (1994)Google Scholar
  11. 11.
    Oppliger, R.: Security issues related to mobile code and agent-based systems. Computer Communications 22(12), 1165–1170 (1999)CrossRefGoogle Scholar
  12. 12.
    Rasmusson, L., Jansson, S.: Simulated social control for secure internet commerce: Position paper at the new security paradigms workshop (1996)Google Scholar
  13. 13.
    Sonntag, M., Hörmanseder, R.: Mobile agent security based on payment. Operating Systems Review 34(4), 48–55 (2000)CrossRefGoogle Scholar
  14. 14.
    Tan, H.K., Moreau, L.: Trust relationships in a mobile agent system. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, p. 15. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  15. 15.
    Varadharajan, V.: Security enhanced mobile agents. In: Proc. of 7th ACM Conference on Computer and Communication Security (2000)Google Scholar
  16. 16.
    Wang, Y., Tan, K.-L., Ren, J.: Pumamart: A parallel and autonomous agents based internet marketplace. Electronic Commerce Research and Applications (ECRA), Elsevier Science 3(3), 294–310 (2004)CrossRefGoogle Scholar
  17. 17.
    Wilhelm, U.G., Staamann, S., Buttyán, L.: On the problem of trust in mobile agent systems. In: Proceedings of 1998 Network and Distributed Security Symposium, San Diego, California, Internet Society (March 11-13, 1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Ching Lin
    • 1
  • Vijay Varadharajan
    • 1
  • Yan Wang
    • 1
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia

Personalised recommendations