20 resultados para raja-asemat

em Deakin Research Online - Australia


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In settings such as electronic markets where trading partners have conflicting interests and a desire to cooperate, mobile agent mediated negotiation have become very popular. However, agent-based negotiation in electronic commerce involves the exchange of critical and sensitive data that must be highly safeguarded. Therefore, in order to give benefits of quick and safe trading to the trading partners, an approach that secures the information exchanged between the mobile agents during e-Commerce negotiations is needed. To this end, we discuss an approach that we refer to as Multi-Agent Security NEgotiation Protocol (MASNEP). To show that MASNEP protocol is free of attacks and thus the information exchanged throughout electronic negotiation is truly secured, we provide a formal proof on the correctness of the MASNEP.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic negotiation (e-negotiation) is a major activity in e-Commerce applications. Agent-based e-negotiation has recently received increasing attention. However, agent-based electronic negotiation suffers from a number of security attacks. In this paper, we present a mobile agent-based e-commerce framework. We also propose a security protocol that protects the information exchanged between the mobile agents during e- negotiations. We reason the correctness of the proposed security protocol in the presence of various security threats. The reasoning shows that the protocol maintains privacy, non- repudiation, authenticity, anonymity, and strong integrity of exchanged information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Negotiation is a vital component of electronic trading. It is the key decision-making approach used to reach consensus between trading partners. Generally, the trading partners implement various negotiation strategies in an attempt to maximize their utilities. As negotiation strategies have impact on the outcomes of negotiation, it is imperative to have efficient negotiation strategies that truly maximize clients’ utilities. In this paper, we propose a multi-attribute mobile agent-based negotiation strategy that maximizes client’s utility. The strategy focuses on one-to-many bilateral negotiation. It considers different factors that have significant effect on the scheduling of various negotiation phases: offer collection, evaluation, negotiation, and bid settlement. The factors include offers expiry time, market search space, communication delays, processing queues, and transportation times. We reasoned about the correctness of the proposed negotiation strategy with respect to the existing negotiation strategies. The analysis showed that the proposed strategy boosts client’s utility, shortens negotiation time, and ensures adequate market search.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of the study was to investigate the relative importance of child and adolescent social and academic pathways to well-being in adulthood (32-years) indicated by a sense of meaning, social engagement, positive coping and prosocial values. Data were drawn from a 15 wave (32-year) longitudinal study of the health and development of around 1000 New Zealanders (Dunedin Multidisciplinary Health and Development Study, New Zealand). Moderate continuity in social connectedness (0.38) and high continuity in academic ability (0.90) was observed across childhood and adolescence. Adolescent social connectedness was a better predictor of adult well-being than academic achievement (0.62 vs. 0.12). There was evidence of an indirect pathway from adolescent academic achievement to adult well-being through social connectedness (0.29). Indicators of well-being in adulthood appear to be better explained by social connection rather than academic competencies pathways. Implications for promoting longer term well-being during the school years are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has recently been shown that food intake is not essential for the resynthesis of the stores of muscle glycogen in fasted animals recovering from high-intensity exercise. Because the effect of diabetes on this process has never been examined before, we undertook to explore this issue. To this end, groups of rats were treated with streptozotocin (60 mg/kg body mass ip) to induce mild diabetes. After 11 days, each animal was fasted for 24 h before swimming with a lead weight equivalent to 9% body mass attached to the tail. After exercise, the rate and the extent of glycogen repletion in muscles were not affected by diabetes, irrespective of muscle fiber composition. Consistent with these findings, the effect of exercise on the phosphorylation state of glycogen synthase in muscles was only minimally affected by diabetes. In contrast to its effects on nondiabetic animals, exercise in fasted diabetic rats was accompanied by a marked fall in hepatic glycogen levels, which, surprisingly, increased to preexercise levels during recovery despite the absence of food intake.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mild physical activity performed immediately after a bout of intense exercise in fasting humans results in net glycogen breakdown in their slow oxidative (SO) muscle fibers and glycogen repletion in their fast twitch (FT) fibers. Because several animal species carry a low proportion of SO fibers, it is unclear whether they can also replenish glycogen in their FT fibers under these conditions. Given that most skeletal muscles in rats are poor in SO fibers (<5%), this issue was examined using groups of 24-h fasted Wistar rats (n = 10) that swam for 3 min at high intensity with a 10% weight followed by either a 60-min rest (passive recovery, PR) or a 30-min swim with a 0.5% weight (active recovery, AR) preceding a 30-min rest. The 3-min sprint caused 61–79% glycogen fall across the muscles examined, but not in the soleus (SOL). Glycogen repletion during AR without food was similar to PR in the white gastrocnemius (WG), where glycogen increased by 71%, and less than PR in both the red and mixed gastrocnemius (RG, MG). Glycogen fell by 26% during AR in the SOL. Following AR, glycogen increased by 36%, 87%, and 37% in the SOL, RG, and MG, respectively, and this was accompanied by the sustained activation of glycogen synthase and inhibition of glycogen phosphorylase in the RG and MG. These results suggest that mammals with a low proportion of SO fibers can also replenish the glycogen stores of their FT fibers under extreme conditions combining physical activity and fasting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this study was to determine the role of the phosphorylation state of glycogen synthase and glycogen phosphorylase in the regulation of muscle glycogen repletion in fasted animals recovering from high-intensity exercise. Groups of rats were swum to exhaustion and allowed to recover for up to 120 min without access to food. Swimming to exhaustion caused substantial glycogen breakdown and lactate accumulation in the red, white and mixed gastrocnemius muscles, whereas the glycogen content in the soleus muscle remained stable. During the first 40 min of recovery, significant repletion of glycogen occurred in all muscles examined except the soleus muscle. At the onset of recovery, the activity ratios and fractional velocities of glycogen synthase in the red, white and mixed gastrocnemius muscles were higher than basal, but returned to pre-exercise levels within 20 min after exercise. In contrast, after exercise the activity ratios of glycogen phosphorylase in the same muscles were lower than basal, and increased to pre-exercise levels within 20 min. This pattern of changes in glycogen synthase and phosphorylase activities, never reported before, suggests that the integrated regulation of the phosphorylation state of both glycogen synthase and phosphorylase might be involved in the control of glycogen deposition after high-intensity exercise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Even in the absence of food intake, several animal species recovering from physical activity of high intensity can replenish completely their muscle glycogen stores. In some species of mammals, such as in rats and humans, glycogen repletion is only partial, thus suggesting that a few consecutive bouts of high-intensity exercise might eventually lead to the sustained depletion of their muscle glycogen. In order to test this prediction, groups of rats with a lead weight of 10% body mass attached to their tails were subjected to either one, two or three bouts of high-intensity swimming, each bout being separated from the next by a 1 h recovery period. Although glycogen repletion after the first bout of exercise was only partial, all the glycogen mobilised in subsequent bouts was completely replenished during the corresponding recovery periods and irrespective of muscle fibre compositions. The impact of repeated bouts of high-intensity exercise on plasma levels of fatty acids, acetoacetate and β-hydroxybutyrate suggests that the metabolic state of the rat prior to the second and third bouts of exercise was different from that before the first bout. In conclusion, rats resemble other vertebrate species in that without food intake there are conditions under which they can replenish completely their muscle glycogen stores from endogenous carbon sources when recovering from high-intensity exercise. It remains to be established, however, whether this capacity is typical of mammals in general.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

£-negotiation handles negotiation over the Internet without human supervision and has shown effectiveness in concluding verifiable and more favorable agreements in a reasonably short time. In this chapter, the authors discuss the negotiation 5ystem and its components with particular emphasis on negotiation strategies. A negotiation strategy defines strategic tactics, which advise on the proper action to select from a set of possible actions that optimizes negotiation outcomes. A strategy should integrate negotiation goals and reactive attitudes. Usually, a fixed strategy is implemented during the course of negotiation regardless ofsignificant decision-makingfactors including market status, opponent :S profile, or eagerness for a negotiated goods/service. The chapter presents the main negotiation strategies and outlines the different decision-makingfactors that should be considered. A strategy uses a utility function to evaluate the offer of an opponent and advises on the generation of a counter offer or the best interaction. The authors finally discuss different utility functions presented in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis proposes a multi-constraint one-to-many bilateral e-Trade negotiation framework. It deploys mobile agents in negotiation, considers trading competition between vendors and search space, efficiently manages the risk of losing top utility offers that expire before the negotiation deadline, accurately evaluates offers, and truly maintains the security of negotiation data.