2000
DOI: 10.1080/10864415.2000.11044203
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2002
2002
2008
2008

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…The problems in agent security arise when an agent is used in open and unsecured environments [8,3]. One kind of attack by an execution host (malicious host) is spying on the agent's code, data and state [6,11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The problems in agent security arise when an agent is used in open and unsecured environments [8,3]. One kind of attack by an execution host (malicious host) is spying on the agent's code, data and state [6,11].…”
Section: Introductionmentioning
confidence: 99%
“…Spying attack by the malicious host on an agent's data or state is difficult to detect, because the attack doesn't leave any detectable trace [6,11,5]. The executing host has to read the agent's code, must have access to the agent's data, and must be able to manipulate the agent's variable data in order to execute the agent [6,5,8]. Therefore, the executing host can see and access all of the agent's code including data and state, and is thus able to hide any traces of an attack, which makes any attempt to address spying attack difficult.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, airlines are now developing technology that will alert passengers, especially frequent fliers, to schedule changes, seat upgrades, and so on, through wireless devices. Recently, the electronic commerce applications provided by mobile communication services include mobile information agents (Mandry et al, 2001;Omicini and Zambonelli, 1998), online kiosks (Slack and Rowley, 2002), government applications (e.g., online selling by the postal service and web-based electronic data interchange in trade applications) and direct online shopping, such as Internet-based (or web-based) shopping malls and Internet-based stock markets. Travel-related and hobby-related sites that provide leisure information are also among the common websites available through mobile communication services.…”
mentioning
confidence: 99%
“…However, this is "less" serious as delegate-agents are destroyed once they complete their operations. It is observed in [10,14] that not only hosts have to be protected from malicious compo-2 Several indicators back the huge development of mobile devices [15].…”
Section: Security Of Uddi Registriesmentioning
confidence: 99%