48,669 Hits in 8.0 sec

A Survey of Self-protected Mobile Agents

Salima Hacini
2013 International Journal of Computer Applications  
In the last several years, mobile agents have proved their numerous applications including e-commerce, telecommunication systems, information management, on-line auctions or service brokering.  ...  Mobile agents are software which moves autonomously through a computer network with aim to perform some computation or gather information on behalf of its creator or an application.  ...  TRUST ESTIMATION Trust plays an important role in e-commerce and e-business security. It is a key to the acceptance and general deployment of this type of applications.  ... 
doi:10.5120/10040-5060 fatcat:ki6hsjvvvzcgtiik6oe5k77ndm

TAMAP: a new trust-based approach for mobile agent protection

Salima Hacini, Zahia Guessoum, Zizette Boufaida
2007 Journal in Computer Virology  
This paper introduces a trust-based mechanism to improve the security of mobile agents against malicious hosts and to allow their execution in various environments.  ...  An adaptive mobile agent architecture is therefore proposed. It endows the mobile agent with the ability to react with an unexpected behavior.  ...  Trust estimation Trust plays an important role in e-commerce and e-business applications. It is a key to their acceptance and their general deployment.  ... 
doi:10.1007/s11416-007-0056-y fatcat:fuzfonio7zcc5lmt5m53ozmdqq

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept [chapter]

Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
2004 Lecture Notes in Computer Science  
Our infrastructural approach is based on a Mobile Agent Secure Hub (MASH) which is capable of providing a large number of security services for agent users and their deployed Internet mobile agents.  ...  We have devised an infrastructural strategy that allows mobile agent users to delegate responsibility to a trusted third party for the safe management of mobile agents they deploy onto the Internet.  ...  The second problem in Hohl's original reference states protocol is no longer an issue (in our adapted approach) because the inserted TTP delegate checking host has no stakeholder application interest in  ... 
doi:10.1007/978-3-540-30191-2_27 fatcat:w4xb5lvo7jbrbat2s3h7coprni

On the design of a mobile agent environment for context-aware M-commerce

Xining Li, Jiazao Lin, Lian Li
2010 2010 3rd International Conference on Computer Science and Information Technology  
M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc.  ...  In this paper, we discuss some important issues in the design of an M-commerce platform based on agent technology and context-aware workflow analysis.  ...  Context-aware Programming To design an agent-based context-aware M-commerce environment, it is important to have a mechanism that enables (mobile) agents to adapt their behavior dynamically to the current  ... 
doi:10.1109/iccsit.2010.5563704 fatcat:jxmmhppnj5cfzdm56lqpnsr77q

Distributed security for multi-agent systems – review and applications

H.F. Rashvand, K. Salah, J.M.A. Calero, L. Harn
2010 IET Information Security  
way enabling a long awaited application paradigm of the near future.  ...  Following a scan of the literature we discuss the state-of-the-art progress followed by some comments for the researchers in the field.  ...  The Internet has emerged as a global infrastructure to be used for commercial and business applications, also called e-commerce and e-business.  ... 
doi:10.1049/iet-ifs.2010.0041 fatcat:44siypwv5vbornjc4j7nzawyqi

The Agent Pattern for Mobile Agent Systems

Alberto Rodrigues da Silva, José C. Delgado
1998 European Conference on Pattern Languages of Programs  
The Agent pattern provides a clean and easy way to develop agent-based applications, mainly in open and large-scale distributed environments such as the Internet and application areas such as Electronic  ...  This paper presents the Agent pattern, a design pattern useful to develop dynamic and distributed applications.  ...  Acknowledgments We would like to thank our shepherd Doug Lea to help improve the pattern mainly in content and structure. We also wish to thank Danny Lange for his comments and references.  ... 
dblp:conf/europlop/SilvaD98 fatcat:reax5ryrqjb6nle4uqbkm5tssu

B2C E-Commerce Fact-Based Negotiation Using Big Data Analytics and Agent-Based Technologies

Hasan Al-Sakran
2014 International Journal of Advanced Computer Science and Applications  
The focus of this study is application of intelligent agent in negotiation between buyer and seller in B2C Commerce using big data analytics.  ...  An experimental design is used to collect intelligent data that can be used in conducting the negotiation process. Such approach will improve quality of negotiation decisions for both parties.  ...  So, a presentation agent dynamically creates new images based on original.  ... 
doi:10.14569/ijacsa.2014.051204 fatcat:bqjoxbys7jclhdyoarufxxcxsi

An Enhanced Secure and Scalable Model for Enterprise Applications using Automated Monitoring

A. Kannammal, V. Ramachandr, N.Ch.S.N. Iyengar
2006 Journal of Computer Science  
This paper proposes a new approach based on shared objects to improve security and mobile agents to improve scalability.  ...  This approach improves security, as clients are not aware of the location of central database and makes e-business more scalable by deploying mobile agents.  ...  A. Kannnan, Dr. Brijendra Singh and Dr.B.K.Ray during the entire course of this work.  ... 
doi:10.3844/jcssp.2006.589.594 fatcat:2kosgcc6vfc4zatywilwnse7be

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.  ...  Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing.  ...  model Application level 51 Policy and trust based Real-time application model& e-business application level E-business application level implementation. 2 Ontology-based context modeling methodology  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq

Trends in Mobile Agent Applications

Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab
2005 Journal of research and practice in information technology  
In this paper we present a comprehensive study of mobile agent applications.  ...  We discuss the potential uses of mobile agents in the various fields and present the many systems and architectures that have been proposed and implemented.  ...  A framework was proposed by Baschieri et al (2002) for constructing new, dynamically adaptable, networked multimedia applications based on a hierarchical mobile agent system.  ... 
dblp:journals/acj/EidAKC05 fatcat:6mlo5lvxhrcs5isqpiebvau3kq

A role-based mobile-agent approach to support e-democracy

Giacomo Cabri, Luca Ferrari, Letizia Leonardi
2005 Applied Soft Computing  
This paper proposes an approach based on mobile agents playing roles to simplify the task of the developers of e-democracy applications making them more flexible and adaptable.  ...  An application example is exploited to show the concrete advantages of our approach. Keywords: E-democracy, Mobile Agents, Roles, Smart Applications. e-government.  ...  Fostering and protecting trust in the market, in the institutions and in the technological infrastructure".  ... 
doi:10.1016/j.asoc.2004.12.001 fatcat:dduvuriv55cupd7egzxse4z6gu

Specifying Standard Security Mechanisms in Multi-agent Systems [chapter]

Stefan Poslad, Patricia Charlton, Monique Calisti
2003 Lecture Notes in Computer Science  
This enables a discussion about the main issues that developers have to face at different levels (i.e., intra-platform, inter-platform and application level) when developing agent-based security solutions  ...  This article reviews the work that the FIPA agent standards body has undertaken to specify security in multi-agent systems.  ...  We also thank people for their response to the FIPA Security WG Request for Information, issued to the agent and security community.  ... 
doi:10.1007/3-540-36609-1_13 fatcat:yhpm2sjzdzd5bhwbh3qbz56u4i

Information agent technology for the Internet: A survey

Matthias Klusch
2001 Data & Knowledge Engineering  
, Remora or WebMate execute a given query concurrently over a variety of given search bots, merge and present the results in a homogeneous, ranking-based view to the user.  ...  Based on a systematic classification of intelligent information agents this paper presents an overview of basic key enabling technologies needed to build such agents, and respective examples of information  ...  Non-Cooperative Mobile Information Agents Mobile information agents may enable migration of small application-based business logic in corporate intranets on demand and dynamic maintenance of connected  ... 
doi:10.1016/s0169-023x(00)00049-5 fatcat:pzgmrncj4zdi7ejszxt3d7vkp4

Privacy Protection through Unlinkability of Customer Activities in Business Processes Using Mobile Agents [chapter]

Matthias Enzmann, Thomas Kunz, Markus Schneider
2002 Lecture Notes in Computer Science  
In this paper, we present a solution based on mobile agents that can be used to prevent the vendor from directly linking information gathered about the customer while searching with identifying information  ...  The system allows to introduce an agent delay at the agent base station which can increase the cardinality of the group of candidates to be linked to a product, and thereby to decrease the linking probability  ...  Adaptation of Agent Components In the following, we will adapt the previously introduced components of a mobile agent according to the requirements of our solution.  ... 
doi:10.1007/3-540-45705-4_33 fatcat:git6ch5jwngxzhmcltt2rjz2g4

Software Agent Technology in Mobile Service Environments

Ralf Sessler, Alexander Keiblinger, Nicolas Varone
2002 M-Services  
We present JIAC IV, a Java-based agent framework designed with the service as a modelling abstraction.  ...  Utilising the JIAC IV agent toolkit, a service developer focuses on application logic using agent services and the co-operation between agents.  ...  Security is a fundamental challenge any m-or e-business project is faced with.  ... 
dblp:conf/mservices/SesslerKV02 fatcat:smxchuxncjgvbno37awlxrirui
« Previous Showing results 1 — 15 out of 48,669 results