Abstract
Mobile software agents are becoming a major trend of distributed systems in the next decade. Electronic commerce and information retrieval are two prospective applications of mobile agents. Nevertheless, security is a crucial concern for such systems. Attacks to agents by malicious hosts are the most challenging part of the problem unsolved. In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. Possible security attacks by malicious hosts to agents in the system are discussed, and solutions to prevent these attacks are presented. Security of the solutions is analysed, and the performance overhead introduced is evaluated.
The work described in this paper was supported by a grant from the Research Grant Council of the Hong Kong Special Administrative Region (Project No. CUHK4432/99E).
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35515-3_53
Chapter PDF
Similar content being viewed by others
References
Danny B. Lange and Mitsuru Oshima. “Seven Good Reasons for Mobile Agents”, Communications of the ACM, p. 88–89, 1999 Mar.
IBM Aglets Software Development Kit Homepage”. http://www.trl.ibm.co.jp/aglets/
Concordia - Java Mobile Agent Technology”. http://www.meitca.com/HSL/Projects/Concordia/
The Home of the Mole “. http://mole.informatik.uni-stuttgart.de/
F. Hohl. “A Model of Attacks of Malicious Hosts Against Mobile Agents”, Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, p. 105–120, INRIA, France, 1998.
Java Security Architecture”. http://java.sun.com/products//j dk/ 1.2/doc s/guide/security/spec/securityspecTOC.fm.html
C. Tschudin. “Mobile Agent Security”, Intelligent Information Agents: Agent Based Information Discovery and Management in the Internet, p. 431–446, Springer, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this paper
Cite this paper
Chan, A.H.W., Wong, K.M., Wong, T.Y., Lyu, M.R. (2000). Securing Mobile Agents for Electronic Commerce: An Experiment. In: Qing, S., Eloff, J.H.P. (eds) Information Security for Global Information Infrastructures. SEC 2000. IFIP — The International Federation for Information Processing, vol 47. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35515-3_48
Download citation
DOI: https://doi.org/10.1007/978-0-387-35515-3_48
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5479-7
Online ISBN: 978-0-387-35515-3
eBook Packages: Springer Book Archive