Skip to main content

Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces

  • Conference paper
Book cover Agent Systems, Mobile Agents, and Applications (ASA 2000, MA 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1882))

Abstract

Cooperating merchants establish a distributed marketplace under the auspices of an independent market authority. Each merchant’s server is equipped with a trusted device, a smart card for example, provided by the market authority. The market authority plays the role of a trusted third party for the customer as well as for the merchants. This paper describes protocols that prevent the malicious alteration of the data collected by visiting mobile agents roaming through the marketplace without being detectable by subsequent servers or by the owner of the agent upon its return. Another protocol makes the trusted device a secure execution platform for routines provided by the agent owner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baentsch, M., Buhler, P., Eirich, T., Höring, F., Oestreicher, M.: JavaCard – from hype to reality. IEEE Concurrency 7(4), 36–43 (1999)

    Article  Google Scholar 

  2. Dasgupta, P., Narasimhan, N., Moser, L.E., Melliar-Smith, P.M.: MAgNET: Mobile agents for networked electronic trading. IEEE Transactions on Knowledge and Data Engineering 11(4), 509–525 (1999)

    Article  Google Scholar 

  3. Devanbu, P.T., Stubblebine, S.G.: Stack and queue integrity on hostile platforms. In: IEEE Symposium on Research in Security and Privacy, pp. 198–207. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  4. Doorenbos, B., Etzioni, O., Weld, D.: A scalable comparison-shopping agent for the world-wide web. In: AGENTS (1997)

    Google Scholar 

  5. Fünfrocken, S.: Protecting mobile web-commerce agents with smartcards. In: Joint Symposium on Agent Systems and Applications and on Mobile Agents (ASA/MA 1999), pp. 90–102. IEEE Computer Society Press, Los Alamitos (1999)

    Chapter  Google Scholar 

  6. Huai, Q., Sandholm, T.: Mobile agents in an electronic auction house. IEEE Internet Computing 4(2), 80–86 (2000)

    Article  Google Scholar 

  7. Karjoth, G., Asokan, N., Gülcü, C.: Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Loureiro, S., Molva, R., Pannetrat, A.: Secure data collection with updates. In: 1st Asia-Pacific Conference on Intelligent Agent Technology, Hong Kong (1999)

    Google Scholar 

  9. Maes, P., Guttman, R., Moukas, A.: Agents that buy and sell: Transforming commerce as we know it. Communications of the ACM 42(3) (1999)

    Google Scholar 

  10. Sander, T., Tschudin, C.: Towards mobile cryptography. In: IEEE Symposium on Research in Security and Privacy, pp. 215–224. IEEE Computer Society Press, Los Alamitos (1998)

    Google Scholar 

  11. Sandholm, T.: eMediator: A next generation electronic commerce server. In: Fourth International Conference on Autonomous Agents (AGENTS 2000), Barcelona, Spain (June 2000)

    Google Scholar 

  12. Vigna, G.: Cryptographic traces for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 137–153. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Vitek, J. (ed.): Secure Internet Programming. LNCS, vol. 1603. Springer, Heidelberg (1999)

    Google Scholar 

  14. Vogler, H., Spriestersbach, A., Moschgath, M.-L.: Protecting competitive negotiation of mobile agents. In: IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1999), pp. 145–150. IEEE Computer Society Press, Los Alamitos (1999)

    Chapter  Google Scholar 

  15. Whitaker, B.: Intelligent agents for electronic commerce. NCR Technical Journal (1999)

    Google Scholar 

  16. Wilhelm, U.G., Staamann, S., Buttyàn, L.: Introducing trusted third parties to the mobile agent paradigm. In: Vitek and Jensen [13], pp. 471–491

    Google Scholar 

  17. Yee, B.S.: A sanctuary for mobile agents. In: Vitek and Jensen [13], pp. 261–273.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karjoth, G. (2000). Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces. In: Kotz, D., Mattern, F. (eds) Agent Systems, Mobile Agents, and Applications. ASA MA 2000 2000. Lecture Notes in Computer Science, vol 1882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45347-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45347-5_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41052-2

  • Online ISBN: 978-3-540-45347-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics