Agents based e-commerce and securing exchanged information

Al-Jaljouli, Raja and Abawajy, Jemal 2009, Agents based e-commerce and securing exchanged information. In Hassanien, A.-E., Abawajy, J. H., Abraham, A. and Hagras, H. (ed), Pervasive computing : innovations in intelligent multimedia and applications, Springer, Dordrecht, Germany, pp.383-404.

Attached Files
Name Description MIMEType Size Downloads

Title Agents based e-commerce and securing exchanged information
Author(s) Al-Jaljouli, Raja
Abawajy, JemalORCID iD for Abawajy, Jemal
Title of book Pervasive computing : innovations in intelligent multimedia and applications
Editor(s) Hassanien, A.-E.
Abawajy, J. H.ORCID iD for Abawajy, J. H.
Abraham, A.
Hagras, H.
Publication date 2009
Chapter number 17
Total chapters 19
Start page 383
End page 404
Total pages 22
Publisher Springer
Place of Publication Dordrecht, Germany
Keyword(s) Mobile agents
Security properties
Formal methods
Security protocols
Security techniques
Electronic commerce
Summary Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.
ISBN 1848825986
ISSN 1617-7975
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 890202 Application Tools and System Utilities
HERDC Research category B1 Book chapter
Copyright notice ©2009, Springer
Persistent URL

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 641 Abstract Views, 4 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jun 2010, 11:36:21 EST by Leanne Swaneveld

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact