SITA: Protecting Internet Trade Agents from Malicious Hosts
The role of agents and their potential in the electronic marketplace has been discussed widely, but the issue of mobile agent vulnerability to attack, particularly from malicious hosts, needs further development. This paper describes our Secure Internet Trade Agents (SITA) framework that allows for multiple ‘window shopping’ agents to retrieve results, whilst providing anonymity for the user, and providing a manageable key structure.
KeywordsMobile Agent Child Agent Electronic Market Electronic Marketplace Trade Agent
Unable to display preview. Download preview PDF.
- 1.SET, Secure Electronic Transaction (SET). http://setco.org
- 2.Schneier, B., Applied Cryptography. Second ed. 1996: John Wiley & Sons, Inc.Google Scholar
- 3.SSL, Secure Sockets Layer (SSL), http://www.netscape.com.
- 5.Yee, B.S., A sanctuary for mobile agents. DARPA Workshop on Foundations for Secure Mobile Code, 1996. http://www.cs.nps.navy.mil/research/languages/statements/bsy.ps
- 7.Meadows, C., Detecting attacks on mobile agents. Workshop on Foundations for Secure Mobile Code, Monterey, California, 1997. p.64–65Google Scholar
- 8.Wang, X.F., X. Yi, and K.Y. Lan, Secure information gathering agent for Internet Trading. 11th Australian Joint Conference on Artificial intelligence (AI’98), 1998. Springer-Verlag Lecture Notes in Artificial Intelligence, Vol. 1544, edited by Chengqi Zhang and Dickson Lukose, Springer-Verlag Publishers, 1998. p.183–194.Google Scholar
- 9.Vigna, G., Protecting mobile agents through tracing. Third Workshop on Mobile Object Systems, June 1997. http://www.cs.ucsb.edu/~vigna/listpub.html
- 10.Kotzanikolaou, P., G. Katsirelos, and V. Chrissilopoulos, Mobile agents for secure electronic transactions. Recent Advances in Signal Processing and Communications, 1999: 363–368.Google Scholar