Advertisement

SITA: Protecting Internet Trade Agents from Malicious Hosts

  • Mark Perry
  • Qin Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2164)

Abstract

The role of agents and their potential in the electronic marketplace has been discussed widely, but the issue of mobile agent vulnerability to attack, particularly from malicious hosts, needs further development. This paper describes our Secure Internet Trade Agents (SITA) framework that allows for multiple ‘window shopping’ agents to retrieve results, whilst providing anonymity for the user, and providing a manageable key structure.

Keywords

Mobile Agent Child Agent Electronic Market Electronic Marketplace Trade Agent 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. 1.
    SET, Secure Electronic Transaction (SET). http://setco.org
  2. 2.
    Schneier, B., Applied Cryptography. Second ed. 1996: John Wiley & Sons, Inc.Google Scholar
  3. 3.
    SSL, Secure Sockets Layer (SSL), http://www.netscape.com.
  4. 4.
    Hohl, F., Time limited blackbox security: protecting mobile agents from malicious hosts. Mobile Agent Security, Lecture Notes in Computer Science. Vol. 1419. 1998: Springer-Verlag. 92–113.CrossRefGoogle Scholar
  5. 5.
    Yee, B.S., A sanctuary for mobile agents. DARPA Workshop on Foundations for Secure Mobile Code, 1996. http://www.cs.nps.navy.mil/research/languages/statements/bsy.ps
  6. 6.
    Sander, T. and C.F. Tschudin, Protecting mobile agents against malicious hosts. Mobile Agent Security, Lecture Notes in Computer Science. Vol. 1419. 1998: Springer-Verlag. 44–60.CrossRefGoogle Scholar
  7. 7.
    Meadows, C., Detecting attacks on mobile agents. Workshop on Foundations for Secure Mobile Code, Monterey, California, 1997. p.64–65Google Scholar
  8. 8.
    Wang, X.F., X. Yi, and K.Y. Lan, Secure information gathering agent for Internet Trading. 11th Australian Joint Conference on Artificial intelligence (AI’98), 1998. Springer-Verlag Lecture Notes in Artificial Intelligence, Vol. 1544, edited by Chengqi Zhang and Dickson Lukose, Springer-Verlag Publishers, 1998. p.183–194.Google Scholar
  9. 9.
    Vigna, G., Protecting mobile agents through tracing. Third Workshop on Mobile Object Systems, June 1997. http://www.cs.ucsb.edu/~vigna/listpub.html
  10. 10.
    Kotzanikolaou, P., G. Katsirelos, and V. Chrissilopoulos, Mobile agents for secure electronic transactions. Recent Advances in Signal Processing and Communications, 1999: 363–368.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Mark Perry
    • 1
  • Qin Zhang
    • 2
  1. 1.Department of Computer ScienceUniversity of Western OntarioLondon
  2. 2.Department of Computer ScienceUniversity of Western OntarioLondon

Personalised recommendations