An evaluation of a secure and trustworthy mobile agent‐based e‐marketplace system
Author:
Patel Ahmed,Qi Wei,Taghavi Mona
Abstract
PurposeMobile agent‐based e‐marketplaces are business applications that have been developed as flexible and efficient approaches to help companies or corporations to extend their businesses to outreach larger markets without regional and continental boundaries. Every distributed system is unable to avoid security problems due to the open internet environment. Mobile agent‐based e‐marketplaces are no exceptions. The purpose of this paper is to design and implement a framework and system of a secure and trustworthy mobile agent‐based e‐marketplace to overcome this problem.Design/methodology/approachThe authors present an analysis and evaluation of a secure and trustworthy mobile agent‐based e‐marketplace, which was specified and prototyped. The experimental results of the implemented system are used to address the evaluation of the system. The discussion of the solution is also presented.FindingsThe evaluation and performance results show that the proposed framework and system have the ability to provide a secure and efficient e‐marketplace environment for trading products. The authors draw conclusions and highlight future work on this specific research area.Originality/valueThe performance and scalability are the two most important issues for mobile‐agent based systems together with their feasibility. The evaluation and performance results are used to reflect the results of the research in its entirety.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference31 articles.
1. Alfalayleh, M. and Brankovic, L. (2004), “An overview of security issues and techniques in mobile agents”, Proceedings of the Eighth IFIP TC‐6 TC‐11 Conference on Communications and Multimedia Security (CMS2004), Vol. 175, pp. 59‐78. 2. Antoniou, G., Leon, S., Stefanos, G. and Paramalli, U. (2008), “Privacy and forensics investigation process: the ERPINA protocol”, Journal of Computer Science and Interface, Vol. 30 No. 4, pp. 229‐36. 3. Braun, P. (2003), “The migration process of mobile agent: implementation, classification, and optimization”, PhD disseration, Computer Science Department, Friedrich‐Schiller‐University Jena, Jena, available at: www.db‐thueringen.de/servlets/DocumentServlet?id=1059 (accessed 2 May 2009). 4. Cerezo, A.I., Lopez, J. and Patel, A. (2007), “International cooperation to fight transnational cybercrime”, Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007 ), pp. 13‐27. 5. Drew, G.N. (1999), Using SET for Secure Electronic Commerce, Prentice‐Hall, Upper Saddle River, NJ, p. 265.
|
|