The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and heterogeneous distributed environments. Several application areas can benefit from the adoption of the MA technology, because it can support electronic commerce transactions and help in information gathering, filtering, and negotiation. MA solutions provide mobility, autonomy and easy personalization, but still lack a comprehensive and widely accepted security framework. Only a full answer to the requirement of protection for both execution sites and mobile shopping agents can leverage the adoption of MA solutions in the electronic commerce area. This paper proposes an MA environment to support secure and open electronic commerce applications. In particular, the paper focuses on how mobile shopping agents can be protected from malicious behaviour of execution sites and presents a range of solution strategies. The first solution makes use of a Trusted Third Party entity, while the second one is based on a distributed approach that does not assume the presence of trusted entities. In addition, these two solutions are integrated in a combined one. The paper compares the different approaches and describes their implementation performance.

Mobile Agents Integrity for Electronic Commerce Applications

STEFANELLI, Cesare
1999

Abstract

The Mobile Agent (MA) paradigm proposes a new approach for designing applications in open and heterogeneous distributed environments. Several application areas can benefit from the adoption of the MA technology, because it can support electronic commerce transactions and help in information gathering, filtering, and negotiation. MA solutions provide mobility, autonomy and easy personalization, but still lack a comprehensive and widely accepted security framework. Only a full answer to the requirement of protection for both execution sites and mobile shopping agents can leverage the adoption of MA solutions in the electronic commerce area. This paper proposes an MA environment to support secure and open electronic commerce applications. In particular, the paper focuses on how mobile shopping agents can be protected from malicious behaviour of execution sites and presents a range of solution strategies. The first solution makes use of a Trusted Third Party entity, while the second one is based on a distributed approach that does not assume the presence of trusted entities. In addition, these two solutions are integrated in a combined one. The paper compares the different approaches and describes their implementation performance.
1999
Corradi, A.; Cremonini, M.; Montanari, R.; Stefanelli, Cesare
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in SFERA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11392/1209679
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 38
  • ???jsp.display-item.citation.isi??? 17
social impact