Security Mechanisms for Using Mobile Agents in Electronic Commerce



In order for mobile agents to be accepted as a basic technology for enabling electronic commerce, proper security mechanisms must be developed. Hosts must be protected from malicious agents, agents must be protected from other agents and also agents must be protected from malicious hosts. For solving the first three problems, existing technology from operating systems and distributed systems research can be used. The last problem is new and specific to the mobile agent paradigm and it is much harder to solve. Due to this problem, many say that mobile agents are not ready for the e commerce systems. In this paper we discuss the security requirements of mobile agents in the context of electronic commerce and analyze how these requirements can be met. We show that, because of the characteristics of e commerce systems, the security requirements of the agents and their users can be assured in real and open environments as the Internet.


Mobile Agents

Cited by

Year 2006 : 1 citations

 1. T. Chen, \"A Noval Key Management and Access Control Method for Mobile Agent\", Master\'s Thesis, Institute of Communicational Engineering, 2006.

Year 2005 : 1 citations

 1. W Qu, H Shen, J Sum, ""Stochastic analysis of mobile agent-based e-shopping", in International Journal of Electronic Business, Vol. 3, Nos. 3/4, 2005

Year 2004 : 1 citations

 1. S. Guan, F. Zhu, and M. Maung, "A Factory-based Approach to Support E-Commerce Agent Fabrication?, in Electronic Commerce Research and Applications Journal, Vol. 3(1), Elsevier Science, pp. 39-53, Spring 2004

Year 2003 : 2 citations

 S. Guan, T. Wang, S. Ong, "Migration Control for Mobile Agents Based on Passport and Visa?, in Future Generation Computer Systems, pp. 173-186, Elsevier Science, ISSN:0167-739X, 2003

 C. Wang, F. Zhang and Y. Wang, "Secure Web Transaction with Anonymous Mobile Agent over the Internet?, in Journal of Science and Technology, Vol. 18(1), pp. 84-89, ISSN 1000-9000, January 2003.

Year 2002 : 7 citations

 L. Korba "Privacy in Distributed Electronic Commerce" Proceedings of th 35th Hawaii International Conference on System Science, Hawaii, January 7-11, 2002, NRC 44891.

 Wang TH, Guan SU, Chan TK, "Integrity protection for Code-on-Demand mobile agents in e-commerce" JOURNAL OF SYSTEMS AND SOFTWARE 60 (3): 211-221 FEB 15 2002.

 S. Guan, T. Wang and S. Ong, "A Secure Approach for Mobile Agent Migration Control?, in Proc. of the Seventh International Symposium on Computers and Communications (ISCC"02), IEEE Press, Taormina/Giardini Naxos, Italy, July 2002

 O. Tomarchio and A. Puliafito. "Design and development of a practical security model for a mobile agent system?, in IEEE Symposium on Computer Communications (ISCC2002), Taormina (Italy), July 2002.

 I. Lin, H. Ou, and M Hwang, "Two Secure Transportation Schemes for Mobile Agents?, in Information & Security Journal, Vol. 8(1), pp. 87-97, ISSN 1311-1493, 2002.

 Required reading in the graduate courses "COS496V/W?, "INF414H? and "INF416H? ("Special Topic with Focus: Mobile Agent Security?), of the University of South Africa, South Africa. Fall 2002. (

 SHENG-UEI GUAN and FANGMING ZHU, "Agent Fabrication and Its Implementation for Agent-Based Electronic Commerce?, in International Journal of Information Technology & Decision Making, Vol. 1, No. 3 (2002) 473"489, World Scientific Publishing Company, 2002

Year 2001 : 1 citations

 1. O. Onbilger, R. Newman, and R. Chow, "A Distributed and Compromise-tolerant Mobile Agent Protection Schemeâ?, in International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC'2001), Las Vegas, USA, July 2001.

Year 2000 : 3 citations

 S. Guan, F. Zhu, and C. Ko, "Agent Fabrication and Authorization in Agent-based Electronic Commerce?, in Proc. International ICSC Congress on Intelligent Systems and Applications, Wollongong, Australia, December 2000.

 Required reading in the "EE657: Parallel Processing? course at the University of Southern California, USA. Fall 2000. (

 IEEE Chiper Reader"s Guide to Security and Privacy Conference Papers (