Skip to main content

SITA: Protecting Internet Trade Agents from Malicious Hosts

  • Conference paper
  • First Online:
Mobile Agents for Telecommunication Applications (MATA 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2164))

  • 186 Accesses

Abstract

The role of agents and their potential in the electronic marketplace has been discussed widely, but the issue of mobile agent vulnerability to attack, particularly from malicious hosts, needs further development. This paper describes our Secure Internet Trade Agents (SITA) framework that allows for multiple ‘window shopping’ agents to retrieve results, whilst providing anonymity for the user, and providing a manageable key structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. SET, Secure Electronic Transaction (SET). http://setco.org

  2. Schneier, B., Applied Cryptography. Second ed. 1996: John Wiley & Sons, Inc.

    Google Scholar 

  3. SSL, Secure Sockets Layer (SSL), http://www.netscape.com.

  4. Hohl, F., Time limited blackbox security: protecting mobile agents from malicious hosts. Mobile Agent Security, Lecture Notes in Computer Science. Vol. 1419. 1998: Springer-Verlag. 92–113.

    Chapter  Google Scholar 

  5. Yee, B.S., A sanctuary for mobile agents. DARPA Workshop on Foundations for Secure Mobile Code, 1996. http://www.cs.nps.navy.mil/research/languages/statements/bsy.ps

  6. Sander, T. and C.F. Tschudin, Protecting mobile agents against malicious hosts. Mobile Agent Security, Lecture Notes in Computer Science. Vol. 1419. 1998: Springer-Verlag. 44–60.

    Chapter  Google Scholar 

  7. Meadows, C., Detecting attacks on mobile agents. Workshop on Foundations for Secure Mobile Code, Monterey, California, 1997. p.64–65

    Google Scholar 

  8. Wang, X.F., X. Yi, and K.Y. Lan, Secure information gathering agent for Internet Trading. 11th Australian Joint Conference on Artificial intelligence (AI’98), 1998. Springer-Verlag Lecture Notes in Artificial Intelligence, Vol. 1544, edited by Chengqi Zhang and Dickson Lukose, Springer-Verlag Publishers, 1998. p.183–194.

    Google Scholar 

  9. Vigna, G., Protecting mobile agents through tracing. Third Workshop on Mobile Object Systems, June 1997. http://www.cs.ucsb.edu/~vigna/listpub.html

  10. Kotzanikolaou, P., G. Katsirelos, and V. Chrissilopoulos, Mobile agents for secure electronic transactions. Recent Advances in Signal Processing and Communications, 1999: 363–368.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Perry, M., Zhang, Q. (2001). SITA: Protecting Internet Trade Agents from Malicious Hosts. In: Pierre, S., Glitho, R. (eds) Mobile Agents for Telecommunication Applications. MATA 2001. Lecture Notes in Computer Science, vol 2164. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44651-6_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-44651-6_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42460-4

  • Online ISBN: 978-3-540-44651-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics