Communications of the ACM
Agent theories, architectures, and languages: a survey
ECAI-94 Proceedings of the workshop on agent theories, architectures, and languages on Intelligent agents
Electronic markets and electronic hierarchies
Communications of the ACM
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Intelligent Software Agents: Foundations and Applications
Intelligent Software Agents: Foundations and Applications
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Are intelligent e-commerce agents partners or predators?
Communications of the ACM - The Adaptive Web
Journal of Intelligent Information Systems
International Journal of Electronic Commerce
Information Systems Frontiers
Hi-index | 0.00 |
This article characterizes the tasks that mobile software agents can perform in electronic markets, the risks they entail, and the appropriate protective mechanisms. Market servers have to be protected against malicious agents, and mobile agents have to be protected against malicious hosts. The latter is quite difficult, because a host must be able to read an agent's code and data in order to execute them. Several approaches to protecting mobile agents are surveyed and evaluated, and the possible application fields for each are examined. One of the approaches is used to develop an electronic market architecture for mobile agents that provides market participants with security and anonymity.