A Deceit-Tolerant Negotiation Model for Agent Mediated Electronic Commerce

In application of agent mediated electronic commerce, there exist many situations where agents have to tolerate insecurity and negotiate with deceit-possible agents. This paper presents DTAN model, a novel negotiation model that agents can use to negotiate in a deceit-tolerant manner to get maximal profit even in an unsecured negotiation process. Unlike current approaches to deception in e-commerce, the DTAN model does not mainly focus on ensuring the trustworthiness of partners before negotiation or terminating negotiation on detecting deception, but how to carry on automated negotiations with suspicious agents, take the risk of unpredictable deceits under control, and attain to good performance in an uncertain environment. Time and belief factors are considered in the model. Due to its deceit-tolerant property, DTAN model is robust and more applicable in open e-commerce systems. Moreover, an applied DTAN model is also presented in this paper.

[1]  N. Shadbolt,et al.  Developing an integrated trust and reputation model for open multi-agent systems , 2004 .

[2]  Joseph G. Tront,et al.  E-commerce security issues , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[3]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[4]  Brian Subirana,et al.  Towards legal programming: The incorporation of legal criteria in software agent design - Current proposals and future prospects , 2004, Comput. Law Secur. Rev..

[5]  Jeremy V. Pitt,et al.  A Computational Framework for Social Agents in Agent Mediated E-commerce , 2003, ESAW.

[6]  José María Sierra,et al.  Protection of Multiagent Systems , 2003, ICCSA.

[7]  Jun Hu,et al.  A new rational model of agent for autonomic computing , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[8]  Rolf Oppliger,et al.  Shaping the research agenda for security in e-commerce , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.

[9]  Audun Jøsang,et al.  Security in Mobile Communications: Challenges and Opportunities , 2003, ACSW.