Openly accessible

Secure mobile agent-based e-negotiation for on-line trading

Al-Jaljouli, Raja and Abawajy, Jemal 2007, Secure mobile agent-based e-negotiation for on-line trading, in 2007 Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology, IEEE, Piscataway, N. J..

Attached Files
Name Description MIMEType Size Downloads
aljaljouli-securemobileagent-2007.pdf Published version application/pdf 1.18MB 4

Title Secure mobile agent-based e-negotiation for on-line trading
Author(s) Al-Jaljouli, Raja
Abawajy, Jemal
Conference name IEEE International Symposium on Signal Processing and Information Technology (7th: 2007 : Cairo, Egypt)
Conference location Cairo, Egypt
Conference dates 15-18 December, 2007
Title of proceedings 2007 Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology
Editor(s) Institute of Electrical and Electronics Engineers
Publication date 2007
Conference series International Symposium on Signal Processing and Information Technology
Publisher IEEE
Place of publication Piscataway, N. J.
Summary Electronic negotiation (e-negotiation) is a major activity in e-Commerce applications. Agent-based e-negotiation has recently received increasing attention. However, agent-based electronic negotiation suffers from a number of security attacks. In this paper, we present a mobile agent-based e-commerce framework. We also propose a security protocol that protects the information exchanged between the mobile agents during e- negotiations. We reason the correctness of the proposed security protocol in the presence of various security threats. The reasoning shows that the protocol maintains privacy, non- repudiation, authenticity, anonymity, and strong integrity of exchanged information.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 9781424418350
1424418356
Language eng
Field of Research 080402 Data Encryption
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2007, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30008146

Document type: Conference Paper
Collections: School of Engineering and Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 417 Abstract Views, 86 File Downloads  -  Detailed Statistics
Created: Mon, 29 Sep 2008, 09:05:05 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.