Abstract
Because Internet trading provides customers with more convenient and more money-saving services than conventional trading, it has seen explosive growth in recent years and will have a major impact in shaping future markets. Certainly, it will be very advantageous for customers if on-line purchases, especially a series of on-line interdependent purchases, are capable of being more automated and secure than is currently the case, since the time and energy they spend will be dramatically reduced. This paper focuses on applying software agent technology together with cryptographic technology to automating and securing electronic transaction for a series of online interdependent purchases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berkovist, S., Guttman, J.D. and Swarup, V.: Authentication for mobile agents. Mobile Agent and Security. LNCS 1419 (1998).
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C. and Tsudik, G.: Itinerant Agents for Mobile Computing. IEEE Personal Communications, 2(3) (1995) 34–49.
Coen, M. H.: SodaBot: A software agent environment and construction system. In Proceedings of the CIKM Workshop on Intelligent Information Agents, Third International Conference on Information and Knowledge Management (CIKM94), Gaithersburg, Maryland, Dec. (1994).
Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Information Theory, vol. IT-22, no.6, Nov. (1976) 644–654.
Green, S., Somers, F., Hurst, L., Evans, R., Nangle, B., Cunningham, P.: Software agent: A review. May (1997).
Halls, D., Bates, J. and Bacon, J.: Flexible distributed programming using mobile code. In Proceeding of the Seventh ACM SIGOPS European Workshop, Sept. (1996) 225–231.
Johansen, D., Renesse, R. V. and Scheidner, F. R.: Operating system support for mobile agents. In Proceeding of the Fifth IEEE Workshop on Hot Topics in Operating System (HTOS), May (1995) 42–45.
Maes, P.: Agents that reduce work and information overload. Communications of the ACM, 37(7) (1994) 31–40.
Minsky, Y., Renesse, R., Schneider, F.B. and Stoller S.D.: Cryptographic Support for Fault-Tolerant Distributed Computing. In Proceedings of the Seventh ACM SIGOPS European Workshop, Connemara, Ireland, September (1996) 109–114.
Moukas, A., Guttman, R., Maes, P.: Agent-mediated electronic commerce: an MIT media laboratory perspective. In Proceedings of the International Conference on Electronic Commerce (1999).
Peine, H. and Stolpmann, T.: The architecture of the Ara platform for mobile agents. In Proceeding of the First International Workshop on Mobile Agents (MA’97), LNCS 1219, Berlin, April (1997).
Rasmusson, L. and Janson, S.: Simulated social control for secure Internet commerce, In Proceedings of New Security Paradigms’96, ACM Press, September (1996).
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital structures and public-key cryptosystem, Commun. ACM, vol.21, no.2, Feb. (1978) 120–127.
Romao, A. and Mira da Silva, M: An agent-based secure Internet payment system for mobile computing. In Proceeding of TrEC’98, LNCS 1402, Hamburg, Germany, June (1998).
Sander, T.: On cryptographic protection of mobile agents. In Proceedings of the 1997 Workshop on Mobile Agents and Security, University of Maryland, Oct. (1997).
Sander, T. and Tschudin, C.F.: Protecting mobile agents against malicious hosts. Mobile Agent and Security, LNCS 1419 (1998).
Tardo, J., and Valenta. L.: Mobile agent security and Telescript. In Proceeding of IEEE COMPCON’96, Feb. (1996).
Visa International and MasterCard International, Secure electronic transaction (SET) specification. Version 1.0, May (1997).
White, J. E.: Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc. (1994).
White, J. E.: Telescript technology: An introduction to the language. General Magic White Paper, General Magic, Inc. (1995).
White, J. E.: Telescript technology: Scenes from the electronic marketplace. General Magic White Paper, General Magic, Inc. (1996).
Wilhelm, U. and Defago, X.: Objects Protégés Cryptographiquement. In Proceedings of RenPar’97, Lausanne, Switzerland, May (1997).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yi, X., Kheong Siew, C., Miao, Y. (2001). Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases. In: Liu, J., Ye, Y. (eds) E-Commerce Agents. Lecture Notes in Computer Science, vol 2033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45370-9_14
Download citation
DOI: https://doi.org/10.1007/3-540-45370-9_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41934-1
Online ISBN: 978-3-540-45370-3
eBook Packages: Springer Book Archive