A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey of Self-protected Mobile Agents
2013
International Journal of Computer Applications
In the last several years, mobile agents have proved their numerous applications including e-commerce, telecommunication systems, information management, on-line auctions or service brokering. ...
Mobile agents are software which moves autonomously through a computer network with aim to perform some computation or gather information on behalf of its creator or an application. ...
TRUST ESTIMATION Trust plays an important role in e-commerce and e-business security. It is a key to the acceptance and general deployment of this type of applications. ...
doi:10.5120/10040-5060
fatcat:ki6hsjvvvzcgtiik6oe5k77ndm
TAMAP: a new trust-based approach for mobile agent protection
2007
Journal in Computer Virology
This paper introduces a trust-based mechanism to improve the security of mobile agents against malicious hosts and to allow their execution in various environments. ...
An adaptive mobile agent architecture is therefore proposed. It endows the mobile agent with the ability to react with an unexpected behavior. ...
Trust estimation Trust plays an important role in e-commerce and e-business applications. It is a key to their acceptance and their general deployment. ...
doi:10.1007/s11416-007-0056-y
fatcat:fuzfonio7zcc5lmt5m53ozmdqq
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept
[chapter]
2004
Lecture Notes in Computer Science
Our infrastructural approach is based on a Mobile Agent Secure Hub (MASH) which is capable of providing a large number of security services for agent users and their deployed Internet mobile agents. ...
We have devised an infrastructural strategy that allows mobile agent users to delegate responsibility to a trusted third party for the safe management of mobile agents they deploy onto the Internet. ...
The second problem in Hohl's original reference states protocol is no longer an issue (in our adapted approach) because the inserted TTP delegate checking host has no stakeholder application interest in ...
doi:10.1007/978-3-540-30191-2_27
fatcat:w4xb5lvo7jbrbat2s3h7coprni
On the design of a mobile agent environment for context-aware M-commerce
2010
2010 3rd International Conference on Computer Science and Information Technology
M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. ...
In this paper, we discuss some important issues in the design of an M-commerce platform based on agent technology and context-aware workflow analysis. ...
Context-aware Programming To design an agent-based context-aware M-commerce environment, it is important to have a mechanism that enables (mobile) agents to adapt their behavior dynamically to the current ...
doi:10.1109/iccsit.2010.5563704
fatcat:jxmmhppnj5cfzdm56lqpnsr77q
Distributed security for multi-agent systems – review and applications
2010
IET Information Security
way enabling a long awaited application paradigm of the near future. ...
Following a scan of the literature we discuss the state-of-the-art progress followed by some comments for the researchers in the field. ...
The Internet has emerged as a global infrastructure to be used for commercial and business applications, also called e-commerce and e-business. ...
doi:10.1049/iet-ifs.2010.0041
fatcat:44siypwv5vbornjc4j7nzawyqi
The Agent Pattern for Mobile Agent Systems
1998
European Conference on Pattern Languages of Programs
The Agent pattern provides a clean and easy way to develop agent-based applications, mainly in open and large-scale distributed environments such as the Internet and application areas such as Electronic ...
This paper presents the Agent pattern, a design pattern useful to develop dynamic and distributed applications. ...
Acknowledgments We would like to thank our shepherd Doug Lea to help improve the pattern mainly in content and structure. We also wish to thank Danny Lange for his comments and references. ...
dblp:conf/europlop/SilvaD98
fatcat:reax5ryrqjb6nle4uqbkm5tssu
B2C E-Commerce Fact-Based Negotiation Using Big Data Analytics and Agent-Based Technologies
2014
International Journal of Advanced Computer Science and Applications
The focus of this study is application of intelligent agent in negotiation between buyer and seller in B2C Commerce using big data analytics. ...
An experimental design is used to collect intelligent data that can be used in conducting the negotiation process. Such approach will improve quality of negotiation decisions for both parties. ...
So, a presentation agent dynamically creates new images based on original. ...
doi:10.14569/ijacsa.2014.051204
fatcat:bqjoxbys7jclhdyoarufxxcxsi
An Enhanced Secure and Scalable Model for Enterprise Applications using Automated Monitoring
2006
Journal of Computer Science
This paper proposes a new approach based on shared objects to improve security and mobile agents to improve scalability. ...
This approach improves security, as clients are not aware of the location of central database and makes e-business more scalable by deploying mobile agents. ...
A. Kannnan, Dr. Brijendra Singh and Dr.B.K.Ray during the entire course of this work. ...
doi:10.3844/jcssp.2006.589.594
fatcat:2kosgcc6vfc4zatywilwnse7be
Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey
2017
Indian Journal of Science and Technology
Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on. ...
Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing. ...
model Application level 51 Policy and trust based Real-time application model& e-business application level E-business application level implementation. 2 Ontology-based context modeling methodology ...
doi:10.17485/ijst/2016/v9i48/89396
fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq
Trends in Mobile Agent Applications
2005
Journal of research and practice in information technology
In this paper we present a comprehensive study of mobile agent applications. ...
We discuss the potential uses of mobile agents in the various fields and present the many systems and architectures that have been proposed and implemented. ...
A framework was proposed by Baschieri et al (2002) for constructing new, dynamically adaptable, networked multimedia applications based on a hierarchical mobile agent system. ...
dblp:journals/acj/EidAKC05
fatcat:6mlo5lvxhrcs5isqpiebvau3kq
A role-based mobile-agent approach to support e-democracy
2005
Applied Soft Computing
This paper proposes an approach based on mobile agents playing roles to simplify the task of the developers of e-democracy applications making them more flexible and adaptable. ...
An application example is exploited to show the concrete advantages of our approach. Keywords: E-democracy, Mobile Agents, Roles, Smart Applications. e-government. ...
Fostering and protecting trust in the market, in the institutions and in the technological infrastructure". ...
doi:10.1016/j.asoc.2004.12.001
fatcat:dduvuriv55cupd7egzxse4z6gu
Specifying Standard Security Mechanisms in Multi-agent Systems
[chapter]
2003
Lecture Notes in Computer Science
This enables a discussion about the main issues that developers have to face at different levels (i.e., intra-platform, inter-platform and application level) when developing agent-based security solutions ...
This article reviews the work that the FIPA agent standards body has undertaken to specify security in multi-agent systems. ...
We also thank people for their response to the FIPA Security WG Request for Information, issued to the agent and security community. ...
doi:10.1007/3-540-36609-1_13
fatcat:yhpm2sjzdzd5bhwbh3qbz56u4i
Information agent technology for the Internet: A survey
2001
Data & Knowledge Engineering
, Remora or WebMate execute a given query concurrently over a variety of given search bots, merge and present the results in a homogeneous, ranking-based view to the user. ...
Based on a systematic classification of intelligent information agents this paper presents an overview of basic key enabling technologies needed to build such agents, and respective examples of information ...
Non-Cooperative Mobile Information Agents Mobile information agents may enable migration of small application-based business logic in corporate intranets on demand and dynamic maintenance of connected ...
doi:10.1016/s0169-023x(00)00049-5
fatcat:pzgmrncj4zdi7ejszxt3d7vkp4
Privacy Protection through Unlinkability of Customer Activities in Business Processes Using Mobile Agents
[chapter]
2002
Lecture Notes in Computer Science
In this paper, we present a solution based on mobile agents that can be used to prevent the vendor from directly linking information gathered about the customer while searching with identifying information ...
The system allows to introduce an agent delay at the agent base station which can increase the cardinality of the group of candidates to be linked to a product, and thereby to decrease the linking probability ...
Adaptation of Agent Components In the following, we will adapt the previously introduced components of a mobile agent according to the requirements of our solution. ...
doi:10.1007/3-540-45705-4_33
fatcat:git6ch5jwngxzhmcltt2rjz2g4
Software Agent Technology in Mobile Service Environments
2002
M-Services
We present JIAC IV, a Java-based agent framework designed with the service as a modelling abstraction. ...
Utilising the JIAC IV agent toolkit, a service developer focuses on application logic using agent services and the co-operation between agents. ...
Security is a fundamental challenge any m-or e-business project is faced with. ...
dblp:conf/mservices/SesslerKV02
fatcat:smxchuxncjgvbno37awlxrirui
« Previous
Showing results 1 — 15 out of 48,669 results