Mobile agents integrity for electronic commerce applications

被引:23
作者
Corradi, A
Cremonini, M
Montanari, R
Stefanelli, C
机构
[1] Univ Bologna, Dipartimento Elettr Informat & Sistemist, I-40126 Bologna, Italy
[2] Univ Ferrara, Dipartimento Ingn, I-44100 Ferrara, Italy
关键词
Internet; e-commerce; security; integrity; mobile agents;
D O I
10.1016/S0306-4379(99)00030-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and heterogeneous distributed environments. Several application areas can benefit from the adoption of the MA technology, because it can support electronic commerce transactions and help in information gathering, filtering, and negotiation. MA solutions provide mobility, autonomy and easy personalisation, but still lack a comprehensive and widely accepted security framework. Only a full answer to the requirement of protection for both execution sites and mobile shopping agents can leverage the adoption of MA solutions in the electronic commerce area. This paper proposes an MA environment to support secure and open electronic commerce applications. In particular, the paper focuses on how mobile shopping agents carl be protected from malicious behaviour of execution sites and presents a range of solution strategies. The first solution makes use of a Trusted Third Party entity, while the second one is based on a distributed approach that does not assume the presence of trusted entities. In addition, these two solutions are integrated in a combined one. The paper compares the different approaches and describes their implementation performance. (C) 1999 Published by Elsevier Science Ltd. All rights reserved.
引用
收藏
页码:519 / 533
页数:15
相关论文
共 26 条
[1]  
BAEK J, 1998, TRDICCSL1998002
[2]  
Chavez A., 1996, PAAM 96. Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, P75
[3]   Locality abstractions and security models in a Mobile Agent environment [J].
Corradi, A ;
Cremonini, M ;
Stefanelli, C .
SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, :230-235
[4]  
DOORENBOS B, 1997, P ACM AUT AG 97 MAR, P39
[5]  
FREIER A, 1996, SSL 3 0 PROTOCOL
[6]   Java']Java security: Present and near future [J].
Gong, L .
IEEE MICRO, 1997, 17 (03) :14-19
[7]  
GUTTMAN R, 1998, GUTTMAN R, V13, P143
[8]   NAP: Practical fault-tolerance for itinerant computations [J].
Johansen, D ;
Marzullo, K ;
Schneider, FB ;
Jacobsen, K ;
Zagorodnov, D .
19TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 1999, :180-189
[9]  
KARJOTH G, 1998, P 2 INT WORKSH MOB A, P195
[10]  
KOTZ D, IEEE