Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bryce C, Vitek J (1999) The JavaSeal mobile agent kernel, ASA/MA, 103-117.
Claessens J, Preneel B, Vandewalle J (2003) (How) can mobile agents do secure electronic transactions on untrusted hosts? ACM Trans, Internet Techn; 3 (1): 28-48.
Chess DM (1998) Security issues in mobile code systems, In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 1-14.
Eklund E (2006) Controlling and securing personal privacy and anonymity in the information society, http://www.niksula.cs.hut.fiek-lund/Opinnot/netsec.html./
Claessens J, Preneel B, Vandewalle J (2001) Secure communication for secure agentbased electronic commerce, In E-Commerce Agents: Marketplace Solu- tions, Security Issues, and Supply and Demand, J. Liu and Y. Ye, Eds., Lecture Notes in Computer Science, vol. 2033, Springer-Verlag, New York, 180-190.
Farmer W, Gutmann J, Swarup V (1996) Security for mobile agents: authenti- cation and state appraisal, Proc. of the European Symposium on Research in Computer Security (ESORICS), LNCS 1146, Springer-Verlag, 118-130.
Edjlali G, Acharya A, Chaudhary V (1998) History-based access control for mobile code, ACM CCCS-98, 413-431.
Han S, Chang E, Dillon T (2005) Secure e-transactions using mobile agents with agent broker, in the Proceedings of the Second IEEE ICSSSM, Jun 13-15, 2005, Chongqing, 849-855.
Graff JC (2001) Cryptograhpy and e-commerce, A Wiley Tech Brief, Wiley Computer Publishing.
Han S, Chang E (2005) A secure strong proxy signature scheme based on DSS, Technical Report, CBS, Curtin University of Technology.
Han S, Chang E, Dillon T (2005) Secure transactions using mobile agents with TTP, in the Proceedings of the Second IEEE ICSSSM, Jun 13-15, 2005, Chongqing, 856-862.
Hassler V (2000) Mobile agent security, In security fundamentals for E- Commerce, Computer Security Series. Artech House, Chapter 20, 331-351.
Hohl F (1998) A model of attacks of malicious hosts against mobile agents, In Proceedings of the fourth ECOOP Workshop on Mobile Oject Systems 1998: Secure Internet Mobile Computation.
Kotzanikolaous P, Burmester M, Chrissikopoulos V (2000) Secure transactions with mobile agents in hostile environments, ACISP 2000, LNCS 1841, SpringerVerlag, 289-297.
Kotzanikolaous P, Katsirelos G, Chrissikopoulos V (1999) Mobile agents for secure electronic transactions, Recent Advances in Signal Processing and Com-munications, World Scientific and Engineering Society Press, 363-368.
Kim S, Park S, Won D (1997) Proxy signatures, revisited, Proc. of ICICS’97,Y. Han et al(Eds.), LNCS 1334, Springer-Verlag, 223-232.
Lee B, Kim H, Kim K (2001) Secure mobile agent using strong non-designated proxy signature, ACISP 2001, Springer-verlag, LNCS 2119, 474-486.
Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications, Proc. of SCIS2001, 603-608.
Loureio S, Molva R (1999) Privacy for mobile code, Proc. of Distributed Object Security Workshop OOPSLA’99.
Merwe J, Solms SH (1997) Electronic commerce with secure intelligent trade agents, Proc. of ICICS’97, Y. Han et al(Eds.), LNCS 1334, Springer-Verlag, 452-462.
Otomura R, Soshi M, Miyaji A (2001) On digital signature schemes for mobile agents, Proc. of SCIS2001, 851-855.
Petersen H, Horster P (1997) Self-certified keys - concepts and applications, Proc. Communications and Multimedia Security’97, Chapman & Hall, 102-116.
Sander T, Tschudin CF (1997) Protecting mobile agents against malicious hosts, Mobile Agent Security, LNCS 1419, Springer-Verlag, 44-60.
Singelee D, Prehneel B (2004) Secure e-commerce using mobile agents on un-trusted hosts, COSIC Internal Report.
Menezes A, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptog-raphy, CRC Press, Boca Raton.
Rscheisen M, Winograd T (1997) A network-centric design for relationship-based security and access control, Journal of Computer Security, 5(3): 249-254.
The digital signature standard, NIST, 1994.
Whitman ME, Mattord HJ (2005) Principles of inforamtion security, Second Edition, Thomson Course Technology.
Li CL, Li LY (2003) Integrate software agents and CORBA in computational grid, Computer Standards & Interfaces, 25(4): 357-371.
Paderewski-Rodrguez P, Rodrguez-Fortiz MJ, Parets-Llorca J (2003) An ar-chitecture for dynamic and evolving cooperative software agents, Computer Standards & Interfaces, 25(3): 261-269.
Tschudin CF (1999) Mobile agent security, In Intelligent Information Agents:Agent-Based Information Discovery and Management on the Internet, M. Klusch, Ed., Springer-Verlag, New York, Chapter 18, 431-446.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Han, S., Chang, E., Dillon, T. (2007). Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy. In: Lu, J., Zhang, G., Ruan, D. (eds) E-Service Intelligence. Studies in Computational Intelligence, vol 37. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-37017-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-37017-8_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37015-4
Online ISBN: 978-3-540-37017-8
eBook Packages: EngineeringEngineering (R0)