Abstract
This paper describes and discusses the malicious agent issues in the agent-mediated electronic markets. We define the malicious agents as software agents that have malicious purpose. Malicious agents can do harm in various ways, such as attacking normal agents, disordering deals, cheating users, stealing intimate information, wasting resources, destroying the markets and so on. We compare the malicious agents with PC viruses in four aspects: originations, actions, means of propagation & infection and speed of propagation & infection. In our opinion, malicious agents are more harmful than the common PC viruses in some measure. We proposed the MA and LMA architecture to deal with the problem described above. Besides, some agent transaction protocols are also presented to show how the MA and LMA architecture works. In the last of this paper, we give some implementation considerations as the foundation for further developments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik, “Itinerant Agents for Mobile Computing”, (M. N. Huhns and M. P. Singh Eds), Readings in Agent, pp. 267–282, Morgan Kaufmann Publishers, Inc, 1997.
M. Crowley-Milling et al. “The Nodal System for the SPS,” CERN, pp. 78–87, 1978.
J. E. White, Telescript Technology: The Foundation for the Electronic Marketplace, (General Magic Inc. Mountain View, CA, 1994.
Sun Microsystems, The HotJava Browser: A white paper, (white paper 1995).
T. Finin et al. “KQML as an Agent Communication Language,” Proceedings of the Third International Conference on Information and Knowledge Management, ACM Press, Nov. 1994
M. R. Genesereth and F. E. Fikes, “Knowledge Interchange Format Version 3.0 Reference Manual,” Technical report, Stanford University, Technical Report Logic-92-1, vol.1, no.1
P. Maes, R. H. Guttman and A. G. Moukas. “Agents that buy and sell”. Communication of the ACM, March 1999/Vol.42, No.3, 81–91.
S. Loureiro, R. Molva and A. Pannetrat, “Secure data collection with updates,” Proceedings of Workshop on Agents in Electronic Commerce, pp.121–130, Hongkong, 1999.
A. Romao, “Proxy Certificates: A mechanism for delegateing digital signature power to mobile agent,” Proceedings of Workshop on Agents in Electronic Commerce, pp.131–140, Hongkong, 1999
X. Yi, S.C. Siew, Y. Miao and Y. Liu, “Secure Electronic Transaction Based on Software Agent,” Proceedings of Workshop on Agents in Electronic Commerce, pp. 176–191, Hongkong, 1999
E. Palmer, “An Introduction to Citadel-a secure crypto coprocessor for workstations, ” in IFIP SEC’94 Conference, Curacao, May 1994
F. Cohen, “Computer Viruses: Theory and Experiment,” Computers and Security, vol.6, pp. 22–35, 1987
S. Loureiro and R. Molva, “Function hiding based on error correcting codes,” M. Blum and C. H. Lee (Eds.) Proceedings of Cryptec’99-International workshop on Cryptographic Techniques and Electronic Commerce, pp. 92–98, Hongkong, 1999
T. Sander and C. Tschudin, “Towards mobile cryptography,” Proceedings of the 1998 IEEE symposium on Security and Privacy, California, 1998
A. Caglayan and C. Harrison. Agent Sourcebook. Wiley Computer Publishing, John Wiley & Sons, Inc. 1997.
D. Chess, “Security Issues in Mobile Code Systems,” Giovanni Vigna (Eds.) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 1–14, Springer-Verlag, 1998.
G. C. Necula and P. Lee, “Safe, Untrusted Agents Using Proof-Carry Code,” Giovanni. Vigna (Eds) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 61–91, Springer-Verlag, 1998.
S. Berkovits, J. D. Guttman and V. Swarup, “Authentication for Mobile Agents,” Giovanni Vigna (Eds.) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 114–136, Springer-Verlag, 1998.
T. Sander and C. F. Tschudin, “Protecting Mobile Agent Against Malicious Hosts,” Giovanni Vigna (Eds.) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 44–60, Springer-Verlag, 1998.
E. Palmer, “An Introduction to Citadel: a secure crypto-coprocessor for workstations,” Proceedings of IFIP SEC’94 Conference, Curacap. Dutch Antilles, May 1994
U. Wilhem and X. Defago, “Objects Proteges Cryptographiquement,” Proceedings of RenPar 97’, Lausanne, Switzerland, 1997
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Peng, D., Jun, S., Ye, S.H., Lu, L. (2001). MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets. In: Liu, J., Ye, Y. (eds) E-Commerce Agents. Lecture Notes in Computer Science, vol 2033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45370-9_12
Download citation
DOI: https://doi.org/10.1007/3-540-45370-9_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41934-1
Online ISBN: 978-3-540-45370-3
eBook Packages: Springer Book Archive