Mobile agents integrity in e-commerce applications

The mobile agent (MA) paradigm seems able to support effectively distributed applications in open and heterogeneous environments, and application areas such as e-commerce appears to be of particular interest. Mobility, autonomy and easy personalization are distinguishing properties of the MA paradigm that can support e-commerce transactions by helping in information gathering, filtering and negotiation. However, MA systems, despite these offered advantages, experience a limited usage because they lack a comprehensive security framework. Only a full answer to the requirement of protection for both execution sites and mobile shopping agents can permit the adoption of MA solutions in the electronic market. This paper describes an MA environment, called Secure and Open Mobile Agent (SOMA), that supports secure and open e-commerce applications. In particular, the paper focuses on how mobile shopping agents can be protected from malicious behavior of execution sites and describes a distributed multiple-hops integrity protocol integrated in SOMA.

[1]  Michael P. Wellman,et al.  The Auction Manager: Market Middleware for Large-Scale Electronic Commerce , 1998, USENIX Workshop on Electronic Commerce.

[2]  Antonio Corradi,et al.  Melding Abstractions with Mobile Agents , 1998, CIA.

[3]  George Cybenko,et al.  AGENT TCL: Targeting the Needs of Mobile Computers , 1997, IEEE Internet Comput..

[4]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[5]  Giovanni Vigna,et al.  Mobile Agents and Security , 1998, Lecture Notes in Computer Science.

[6]  Pattie Maes,et al.  Agent-mediated Electronic Commerce : A Survey , 1998 .

[7]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[8]  John K. Ousterhout,et al.  The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.

[9]  N. Asokan,et al.  Protecting the computation results of free-roaming agents , 1998, Personal Technologies.

[10]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[11]  Pattie Maes,et al.  Agent-mediated electronic commerce: issues, challenges and some viewpoints , 1998, AGENTS '98.

[12]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[13]  Winfried Lamersdorf,et al.  Agents, services, and electronic markets: how do they integrate? , 1996 .

[14]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.