Abstract
The agent programming approach can be beneficial for many new applications on the World Wide Web. We propose a novel agent workspace on the client side for hosting Web agents downloaded from different Web servers—the “Secure Client Agent Environment” (SCAE). This user-centred marketplace facilitates collaboration among Web agents, Web servers and the user. In our agent-based framework, domain-based security servers and authorisation tokens are used to complete the trust links between the client and various Web servers dynamically.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ashley P. & Vandenwauver M. (1999). Practical Intranet Security: An Overview of the State of the Art and Available Technologies. Kluwer Academic Publishers.
Au R., Looi M. & Ashley P. (2000) Cross-Domain One-Shot Authorisation Using Smart Cards. Proceedings of 7th ACM Conference on Computer and Communication Security, pages 220–227.
Au R., Looi M. & Ashley P. (2001) Automated Cross-organisational Trust Establishment on Extranets. Proceedings of the Workshop on Information Technology for Virtual Enterprises(ITVE’ 2001), pages 3–11.
Chess D. (1998) Security Issues in Mobile Code Systems. Mobile Agent Security, LNCS 1419, Springer, pages 1–14.
Farmer W.M. & Guttman J.D. & Swarup V. (1996). Security for Mobile agents: Authentication and state appraisal. European Symposium on Research in Computer Security, LNCS 1146, Springer, pages 118–130.
Hohl F. (1998). Time limited blackbox security: Protecting mobile agents from malicious hosts. Mobile Agents and Security, LNCS 1419, Springer, pages 92–113.
iButton Inc. URL: http://www.iButton.com
Jonathan B.& David K. & Daniela R. (1998). Market-based Resource Control for Mobile Agents. Proceedings of the 2nd International Conference on Autonomous Agents, ACM Press, pages 197–204.
Kohl J. & Neuman C. (1993) The Kerberos Network Authentication Service V5. RFC1510.
Rosenberry, W., Kenney D. and Fisher G. (1992). Understanding DCE. O’Reilly & Associates, Inc.
Vigna G. Cryptographic Traces for Mobile Agents. Mobile Agents and Security, Springer-Verlag, LNCS 1419, Springer, pages 137–153.
Wooldridge M. & Jennings N. R. (1995) Intelligent agents: Theory and practice. Knowledge Engineering Review, (10):2, pages 115–152.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Au, R., Yao, M., Looi, M., Ashley, P. (2002). Secure Client Agent Environment (SCAE) for World Wide Web. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2002. Lecture Notes in Computer Science, vol 2455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45705-4_25
Download citation
DOI: https://doi.org/10.1007/3-540-45705-4_25
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44137-3
Online ISBN: 978-3-540-45705-3
eBook Packages: Springer Book Archive