Agents based e-commerce and securing exchanged information


Autoria(s): Al-Jaljouli, Raja; Abawajy, Jemal
Contribuinte(s)

Hassanien, A.-E.

Abawajy, J. H.

Abraham, A.

Hagras, H.

Data(s)

01/01/2009

Resumo

Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30029096

Idioma(s)

eng

Publicador

Springer

Relação

http://dro.deakin.edu.au/eserv/DU:30029096/abawajy-agentsbasedecommerce-2009.pdf

http://dro.deakin.edu.au/eserv/DU:30029096/abawajy-pervasivecomputing-2009.pdf

Direitos

2009, Springer

Palavras-Chave #Mobile agents #Security properties #Formal methods #Security protocols #Security techniques #Electronic commerce
Tipo

Book Chapter