Secure transactions using mobile agents with TTP
MetadataShow full item record
Copyright 2005 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Electronic commerce has pushed and benefited from the development of mobile agents technology. One of the reasons is electronic commerce needs remote searching and negotiating between one customer and a number of E-shops. Mobile agents can travel over the Intranet or Internet. Therefore, mobile agents can help the customer or E-shops with remote searching and negotiating. However, because of the heterogeneousness of the networks the mobile agents migrate to, security issues should be tackled with cautions. This paper presents a new secure electronic commerce protocol. The underlying transactions are accomplished with mobile agents. A trusted third party (in fact, a trusted authority) is involved in the protocol.
Showing items related by title, author, creator and subject.
Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidenceChang, Elizabeth; Dillon, Tharam S.; Hussain, Farookh (2006)Trust has played a central role in human relationships and hence has been the subject of study in many fields including business, law, social science, philosophy and psychology. It has played a pivotal role in forming ...
Han, Song; Chang, Elizabeth; Dillon, Tharam S. (2005)Online transactions using mobile agents need secure protocols to help these mobile agents to accomplish the transactions initiated by a client in electronic commerce. However, the mobile agent could encounter a hostile ...
Han, Song; Chang, Elizabeth; Dillon, Tharam S. (2005)Online transactions using mobile agents need secure protocols to help the mobile agents to accomplish the transactions initiated by a client in an electronic commerce. However, the mobile agent could encounter hostile ...