Skip to main content

MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets

  • Chapter
  • First Online:
E-Commerce Agents

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2033))

  • 622 Accesses

Abstract

This paper describes and discusses the malicious agent issues in the agent-mediated electronic markets. We define the malicious agents as software agents that have malicious purpose. Malicious agents can do harm in various ways, such as attacking normal agents, disordering deals, cheating users, stealing intimate information, wasting resources, destroying the markets and so on. We compare the malicious agents with PC viruses in four aspects: originations, actions, means of propagation & infection and speed of propagation & infection. In our opinion, malicious agents are more harmful than the common PC viruses in some measure. We proposed the MA and LMA architecture to deal with the problem described above. Besides, some agent transaction protocols are also presented to show how the MA and LMA architecture works. In the last of this paper, we give some implementation considerations as the foundation for further developments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik, “Itinerant Agents for Mobile Computing”, (M. N. Huhns and M. P. Singh Eds), Readings in Agent, pp. 267–282, Morgan Kaufmann Publishers, Inc, 1997.

    Google Scholar 

  2. M. Crowley-Milling et al. “The Nodal System for the SPS,” CERN, pp. 78–87, 1978.

    Google Scholar 

  3. J. E. White, Telescript Technology: The Foundation for the Electronic Marketplace, (General Magic Inc. Mountain View, CA, 1994.

    Google Scholar 

  4. Sun Microsystems, The HotJava Browser: A white paper, (white paper 1995).

    Google Scholar 

  5. T. Finin et al. “KQML as an Agent Communication Language,” Proceedings of the Third International Conference on Information and Knowledge Management, ACM Press, Nov. 1994

    Google Scholar 

  6. M. R. Genesereth and F. E. Fikes, “Knowledge Interchange Format Version 3.0 Reference Manual,” Technical report, Stanford University, Technical Report Logic-92-1, vol.1, no.1

    Google Scholar 

  7. P. Maes, R. H. Guttman and A. G. Moukas. “Agents that buy and sell”. Communication of the ACM, March 1999/Vol.42, No.3, 81–91.

    Article  Google Scholar 

  8. S. Loureiro, R. Molva and A. Pannetrat, “Secure data collection with updates,” Proceedings of Workshop on Agents in Electronic Commerce, pp.121–130, Hongkong, 1999.

    Google Scholar 

  9. A. Romao, “Proxy Certificates: A mechanism for delegateing digital signature power to mobile agent,” Proceedings of Workshop on Agents in Electronic Commerce, pp.131–140, Hongkong, 1999

    Google Scholar 

  10. X. Yi, S.C. Siew, Y. Miao and Y. Liu, “Secure Electronic Transaction Based on Software Agent,” Proceedings of Workshop on Agents in Electronic Commerce, pp. 176–191, Hongkong, 1999

    Google Scholar 

  11. E. Palmer, “An Introduction to Citadel-a secure crypto coprocessor for workstations, ” in IFIP SEC’94 Conference, Curacao, May 1994

    Google Scholar 

  12. F. Cohen, “Computer Viruses: Theory and Experiment,” Computers and Security, vol.6, pp. 22–35, 1987

    Article  Google Scholar 

  13. S. Loureiro and R. Molva, “Function hiding based on error correcting codes,” M. Blum and C. H. Lee (Eds.) Proceedings of Cryptec’99-International workshop on Cryptographic Techniques and Electronic Commerce, pp. 92–98, Hongkong, 1999

    Google Scholar 

  14. T. Sander and C. Tschudin, “Towards mobile cryptography,” Proceedings of the 1998 IEEE symposium on Security and Privacy, California, 1998

    Google Scholar 

  15. A. Caglayan and C. Harrison. Agent Sourcebook. Wiley Computer Publishing, John Wiley & Sons, Inc. 1997.

    Google Scholar 

  16. D. Chess, “Security Issues in Mobile Code Systems,” Giovanni Vigna (Eds.) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 1–14, Springer-Verlag, 1998.

    Google Scholar 

  17. G. C. Necula and P. Lee, “Safe, Untrusted Agents Using Proof-Carry Code,” Giovanni. Vigna (Eds) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 61–91, Springer-Verlag, 1998.

    Chapter  Google Scholar 

  18. S. Berkovits, J. D. Guttman and V. Swarup, “Authentication for Mobile Agents,” Giovanni Vigna (Eds.) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 114–136, Springer-Verlag, 1998.

    Chapter  Google Scholar 

  19. T. Sander and C. F. Tschudin, “Protecting Mobile Agent Against Malicious Hosts,” Giovanni Vigna (Eds.) Mobile Agents and Security, Lecture Notes in Computer Science, 1419, pp. 44–60, Springer-Verlag, 1998.

    Google Scholar 

  20. E. Palmer, “An Introduction to Citadel: a secure crypto-coprocessor for workstations,” Proceedings of IFIP SEC’94 Conference, Curacap. Dutch Antilles, May 1994

    Google Scholar 

  21. U. Wilhem and X. Defago, “Objects Proteges Cryptographiquement,” Proceedings of RenPar 97’, Lausanne, Switzerland, 1997

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Peng, D., Jun, S., Ye, S.H., Lu, L. (2001). MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets. In: Liu, J., Ye, Y. (eds) E-Commerce Agents. Lecture Notes in Computer Science, vol 2033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45370-9_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-45370-9_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41934-1

  • Online ISBN: 978-3-540-45370-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics