Abstract
Although electronic commerce is a relatively new concept, it has already become a normal aspect of our daily life. The software agent technology is also relatively new. In the area of electronic commerce, software agents could be used for example to search for the lowest prices and the best services, to buy goods on behalf of a user, etc. These applications involve a number of security issues, such as communications security, system security, and application security, that have to be solved. This paper describes how communications security is added to a lightweight agent framework. Secure agent-based electronic commerce applications require communications security services. Adding these services is a first basis and an important enabler for the framework in order to be used for secure electronic commerce applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dartmouth College. D’Agents. http://agent.cs.dartmouth.edu/
Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246 (1999)
Doraswamy, N., Harkins, D.: IPSec The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice-Hall (1999)
Finin, T., Labrou, Y., Mayfield, J.: KQML as an agent communication language. In: Bradshaw, J. (ed.): Software Agents (1997)
He, Q., Sycara, K. P.: Towards a Secure Agent Society. ACM AA’98 Workshop on Deception, Fraud and Trust in Agent Societies (1998)
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998)
IAIK. Java crypto software. http://jcewww.iaik.tu-graz.ac.at/
IBM. Aglets. http://www.trl.ibm.co.jp/aglets/
Kindborg, M., Ã…berg, J., and Shahmehri, N.: A lightweight agent framework for interactive multi-agent applications. In: Proceedings of Fourth International Conference on the Practical Application of Intelligent Agents and Multi-Agents (1999) http://www.ida.liu.se/~mikki/PAAM99/
Kohl, J., Neuman, C.: The Kerberos Network Authentication Service V5. RFC 1510 (1993)
Stanford University. JATLite. http://java.stanford.edu/
Sun Microsystems. Java. http://java.sun.com/
Sun. Java Cryptography Extension (JCE). http://java.sun.com/products/jce/
Sun. Java Secure Socket Extension (JSSE). http://java.sun.com/products/jsse/
Necula, G., Lee, P.: Safe, Untrusted Agents Using Proof-Carrying Code. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998)
Riordan, J., Schneier, B.: Environmental Key Generation Towards Clueless Agents. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998)
Vigna, G.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.): Mobile Agents and Security. LNCS 1419, Springer-Verlag (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Claessens, J., Preneel, B., Vandewalle, J. (2001). Secure Communication for Secure Agent-Based Electronic Commerce Applications. In: Liu, J., Ye, Y. (eds) E-Commerce Agents. Lecture Notes in Computer Science, vol 2033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45370-9_11
Download citation
DOI: https://doi.org/10.1007/3-540-45370-9_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41934-1
Online ISBN: 978-3-540-45370-3
eBook Packages: Springer Book Archive