scispace - formally typeset
Book ChapterDOI

Electronic commerce with secure intelligent trade agent

Reads0
Chats0
TLDR
It is shown that distributed-object technology is an enabling technology for intelligent trade agents that roam a network, collect and analyse the data from servers on the network and make decisions to buy and sell goods on behalf of a user.
Abstract
Electronic commerce on the Internet has the potential to generate billions of transactions but the number of merchants providing goods or services on the Internet will be so large, that it will become impossible for humans to visit each site and decide where it is best to buy or sell goods. In this paper we develop intelligent trade agents that roam a network, collect and analyse the data from servers on the network and make decisions to buy and sell goods on behalf of a user. The combination of distributed-object technology and single and public key encryption mechanisms makes these agents secure intelligent trade agents. We show that distributed-object technology is an enabling technology for intelligent trade agents.

read more

Citations
More filters
Book ChapterDOI

Secure Mobile Agent Using Strong Non-designated Proxy Signature

TL;DR: This paper shows that secure mobile agent can be constructed using strong non-designated proxy signature [LKK01] which represents both the original signer and the proxy signer's (remote server) signatures, and provides RSA-based and Schnorr-based constructions of secure mobileAgent.
Patent

Intelligent software agent system architecture

TL;DR: In this article, the authors propose a software architecture that supports deployment of mobile software agents over the Internet, where agents are bifurcated into two parts, a first part executable on a user's client platform (mBot) and a corresponding second part, called sBot, executable on the bot server (sBot server).
Book ChapterDOI

Secure Transactions with Mobile Agents in Hostile Environments

TL;DR: This paper considers a framework for the prevention of agent tampering without compromising the mobility or autonomy of the agent and presents an RSA implementation which answers affirmatively the open problem on undetachable signatures of Sander and Tschudin.

Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature

TL;DR: proxy signature scheme is applied to the mobile agent system to enhance security and eciency and a one-time proxy signature scheme to limit the signing power of the server is suggested.
Journal ArticleDOI

Decision supporting functionality in a virtual enterprise network

TL;DR: This paper attempts to introduce a Neural On-Line Analytical Processing System (NOLAPS), which is able to contribute to the creation of decision support functionality in a virtual enterprise network.
References
More filters
Journal ArticleDOI

Software agents

TL;DR: In this approach to software development, application programs are written as software agents, i.e. software “components” that communicate with their peers by exchanging messages in an expressive agent communication language.
Book

The Essential Distributed Objects Survival Guide

TL;DR: Client/Server with Objects CORBA: The Object Bus Distributed Object Services: ORB Meets Lego Components: Pluggable Parts OpenDoc Under the Hood OLE Under The Hood Client/Server With Parts.
Journal ArticleDOI

COACH: a teaching agent that learns

TL;DR: The adaptive teaching scenario works to keep this type of programmer oricntcd by providing context-sensitive help and user examples.
Book

Client/Server Survival Guide with OS/2

TL;DR: Orfali and Harkey give the lowdown on the current crop of operating systems including OS/2, Windows NT, Windows 3.X, UNIX and NetWare and take a close look at communication stacks, distributed computing environments and messaging middleware from top manufacturers.