Skip to main content

Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3592))

Abstract

Utility has become an important consideration for information security. In this paper, we show that decisions by security mechanisms, such as the authorization decisions in a mobile agent based e-commerce system, have a direct impact on the utility of the underlying system. While benevolent behaviors contribute to the utility, malicious behaviors are the causes for lost of utility. Furthermore we show that a trust enhanced security framework can be deployed to maximize the utility of the mobile agent based e-commerce systems. This is due to one of the unique features of trust enhanced security solutions – the ability to use trust evaluation to “weed out” malicious entities. This paper presents a qualitative solution for utility maximization, and paves the way for future development of quantitative solutions. Finally, we study the properties of the proposed framework through simulation and present the results of the simulated studies which confirm our intuitions about utility maximization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 3–18. Springer, Heidelberg (1994)

    Google Scholar 

  2. Chess, D.M.: Security issues in mobile code systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 1. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Gong, L., Ellison, G., Dageforde, M. (eds.): Inside Java 2 Platform Security: Architecture, API Design, and Implementation, 2nd edn. Addison-Wesley PublishingCo., Inc., Reading (May 2003)

    Google Scholar 

  4. IEEE Security and Privacy, Vol. 3(1), Economics of Information Security. IEEE Computer Society (2005)

    Google Scholar 

  5. Jansen, W.: Countermeasures for mobile agent security. Comupter Communications, Special Issue on Advances of Network Security (November 2000)

    Google Scholar 

  6. Josang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)

    MathSciNet  Google Scholar 

  7. Lange, D.B., Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley, Reading (1998)

    Google Scholar 

  8. Lin, C., Varadharajan, V., Wang, Y., Mu, Y.: On the design of a new trust model for mobile agent security. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 60–69. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust enhanced security for mobile agents. In: To appear in 7th International IEEE Conference on E-Commerce Technology 2005, Technische Universität München, Germany, July 19-22, IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  10. Marsh, S.: Formalising trust as a computational concept. PhD thesis, University of Stirling (1994)

    Google Scholar 

  11. Oppliger, R.: Security issues related to mobile code and agent-based systems. Computer Communications 22(12), 1165–1170 (1999)

    Article  Google Scholar 

  12. Rasmusson, L., Jansson, S.: Simulated social control for secure internet commerce: Position paper at the new security paradigms workshop (1996)

    Google Scholar 

  13. Sonntag, M., Hörmanseder, R.: Mobile agent security based on payment. Operating Systems Review 34(4), 48–55 (2000)

    Article  Google Scholar 

  14. Tan, H.K., Moreau, L.: Trust relationships in a mobile agent system. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, p. 15. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. Varadharajan, V.: Security enhanced mobile agents. In: Proc. of 7th ACM Conference on Computer and Communication Security (2000)

    Google Scholar 

  16. Wang, Y., Tan, K.-L., Ren, J.: Pumamart: A parallel and autonomous agents based internet marketplace. Electronic Commerce Research and Applications (ECRA), Elsevier Science 3(3), 294–310 (2004)

    Article  Google Scholar 

  17. Wilhelm, U.G., Staamann, S., Buttyán, L.: On the problem of trust in mobile agent systems. In: Proceedings of 1998 Network and Distributed Security Symposium, San Diego, California, Internet Society (March 11-13, 1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, C., Varadharajan, V., Wang, Y. (2005). Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_16

Download citation

  • DOI: https://doi.org/10.1007/11537878_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28224-2

  • Online ISBN: 978-3-540-31796-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics