Abstract
Utility has become an important consideration for information security. In this paper, we show that decisions by security mechanisms, such as the authorization decisions in a mobile agent based e-commerce system, have a direct impact on the utility of the underlying system. While benevolent behaviors contribute to the utility, malicious behaviors are the causes for lost of utility. Furthermore we show that a trust enhanced security framework can be deployed to maximize the utility of the mobile agent based e-commerce systems. This is due to one of the unique features of trust enhanced security solutions – the ability to use trust evaluation to “weed out” malicious entities. This paper presents a qualitative solution for utility maximization, and paves the way for future development of quantitative solutions. Finally, we study the properties of the proposed framework through simulation and present the results of the simulated studies which confirm our intuitions about utility maximization.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)
Chess, D.M.: Security issues in mobile code systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 1. Springer, Heidelberg (1998)
Gong, L., Ellison, G., Dageforde, M. (eds.): Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edn. Addison-Wesley PublishingCo., Inc., Reading (May 2003)
IEEE Security and Privacy, Vol. 3(1), Economics of Information Security. IEEE Computer Society (2005)
Jansen, W.: Countermeasures for mobile agent security. Comupter Communications, Special Issue on Advances of Network Security (November 2000)
Josang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)
Lange, D.B., Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley, Reading (1998)
Lin, C., Varadharajan, V., Wang, Y., Mu, Y.: On the design of a new trust model for mobile agent security. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 60–69. Springer, Heidelberg (2004)
Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust enhanced security for mobile agents. In: To appear in 7th International IEEE Conference on E-Commerce Technology 2005, Technische Universität München, Germany, July 19-22, IEEE Computer Society Press, Los Alamitos (2005)
Marsh, S.: Formalising trust as a computational concept. PhD thesis, University of Stirling (1994)
Oppliger, R.: Security issues related to mobile code and agent-based systems. Computer Communications 22(12), 1165–1170 (1999)
Rasmusson, L., Jansson, S.: Simulated social control for secure internet commerce: Position paper at the new security paradigms workshop (1996)
Sonntag, M., Hörmanseder, R.: Mobile agent security based on payment. Operating Systems Review 34(4), 48–55 (2000)
Tan, H.K., Moreau, L.: Trust relationships in a mobile agent system. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, p. 15. Springer, Heidelberg (2001)
Varadharajan, V.: Security enhanced mobile agents. In: Proc. of 7th ACM Conference on Computer and Communication Security (2000)
Wang, Y., Tan, K.-L., Ren, J.: Pumamart: A parallel and autonomous agents based internet marketplace. Electronic Commerce Research and Applications (ECRA), Elsevier Science 3(3), 294–310 (2004)
Wilhelm, U.G., Staamann, S., Buttyán, L.: On the problem of trust in mobile agent systems. In: Proceedings of 1998 Network and Distributed Security Symposium, San Diego, California, Internet Society (March 11-13, 1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, C., Varadharajan, V., Wang, Y. (2005). Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_16
Download citation
DOI: https://doi.org/10.1007/11537878_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28224-2
Online ISBN: 978-3-540-31796-8
eBook Packages: Computer ScienceComputer Science (R0)