메뉴 건너뛰기




Volumn 29, Issue 12, 2006, Pages 2308-2321

Secure brokerage mechanisms for mobile electronic commerce

Author keywords

Broker; M commerce; Mobile agent; Public Key Certificates (PKCs)

Indexed keywords

DIGITAL WATERMARKING; INFORMATION DISSEMINATION; INTERNET; NETWORK PROTOCOLS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY;

EID: 33746169048     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2006.03.005     Document Type: Article
Times cited : (24)

References (29)
  • 1
    • 33746162738 scopus 로고    scopus 로고
    • IST SIMPLICITY Project: .
  • 2
    • 33746106424 scopus 로고    scopus 로고
    • IST UBISEC Project: .
  • 3
    • 33746124169 scopus 로고    scopus 로고
    • ITU-T SG16: .
  • 4
    • 0002380598 scopus 로고    scopus 로고
    • Security issues in mobile code systems
    • Mobile Agents and Security, Springer-Verlag, Berlin
    • Chess D. Security issues in mobile code systems. Mobile Agents and Security. LNCS vol. 1419 (1998), Springer-Verlag, Berlin
    • (1998) LNCS , vol.1419
    • Chess, D.1
  • 5
    • 33746123380 scopus 로고    scopus 로고
    • D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, G. Tsudik, Itinerant agents for mobile computing, in: Readings in Agents, 1997.
  • 6
    • 33746111436 scopus 로고    scopus 로고
    • D. Chess, C. Harrison, A. Kershenbaum, Mobile agents: are they a good idea, IBM Research Report, 1995.
  • 7
    • 28844456618 scopus 로고    scopus 로고
    • Graph theoretic software watermarks: implementation, analysis, and attacks
    • 6th International Workshop on Information Hiding, Springer-Verlag, Berlin
    • Collberg C., Huntwork A., Carter E., and Townsend G. Graph theoretic software watermarks: implementation, analysis, and attacks. 6th International Workshop on Information Hiding. LNCS vol. 3200 (2004), Springer-Verlag, Berlin
    • (2004) LNCS , vol.3200
    • Collberg, C.1    Huntwork, A.2    Carter, E.3    Townsend, G.4
  • 8
    • 0032691819 scopus 로고    scopus 로고
    • C. Collberg, C. Thomborson, Software watermarking: models and dynamic embeddings, in: Principles of Programming Languages 1999, POPL'99, 1999.
  • 9
    • 33746175687 scopus 로고    scopus 로고
    • C. Collberg, C. Thomborson, D. Low, A taxonomy of obfuscating transformations, Technical Report 148, The University of Auckland, 1997.
  • 10
    • 35248833019 scopus 로고    scopus 로고
    • Host revocation authority: a way of protecting mobile agents from malicious hosts
    • International Conference on Web Engineering (ICWE 2003), Springer-Verlag, Berlin
    • Esparza O., Soriano M., Muñoz J.L., and Forné J. Host revocation authority: a way of protecting mobile agents from malicious hosts. International Conference on Web Engineering (ICWE 2003). LNCS vol. 2722 (2003), Springer-Verlag, Berlin
    • (2003) LNCS , vol.2722
    • Esparza, O.1    Soriano, M.2    Muñoz, J.L.3    Forné, J.4
  • 11
    • 18144431695 scopus 로고    scopus 로고
    • O. Esparza, M. Soriano, J.L. Muñoz, J. Forné, Punishing manipulation attacks in mobile agent systems, in: IEEE Global Telecommunications Conference (Globecom 2004), 2004.
  • 13
    • 33746117906 scopus 로고    scopus 로고
    • W.M. Farmer, J.D. Guttman, V. Swarup, Security for mobile agents: issues and requirements, in: 19th National Information Systems Security Conference, 1996.
  • 14
    • 0001943763 scopus 로고    scopus 로고
    • Time limited Blackbox security: protecting mobile agents from malicious hosts
    • Mobile Agents and Security, Springer-Verlag, Berlin
    • Hohl F. Time limited Blackbox security: protecting mobile agents from malicious hosts. Mobile Agents and Security. LNCS vol. 1419 (1998), Springer-Verlag, Berlin
    • (1998) LNCS , vol.1419
    • Hohl, F.1
  • 15
    • 33746152747 scopus 로고    scopus 로고
    • F. Hohl, A protocol to detect malicious hosts attacks by using reference states, 1999.
  • 16
    • 33746147731 scopus 로고    scopus 로고
    • R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, 1999. RFC 2459.
  • 17
    • 33746135600 scopus 로고    scopus 로고
    • ITU/ISO Recommendation, X.509 Information Technology Open Systems Interconnection - The Directory: Authentication Frameworks, 2000. Technical Corrigendum.
  • 18
    • 0034315517 scopus 로고    scopus 로고
    • W. Jansen, Countermeasures for Mobile Agent Security, Computer Communications, Special Issue on Advanced Security Techniques for Network Protection, 2000.
  • 19
    • 33746111128 scopus 로고    scopus 로고
    • W. Jansen, T. Karygiannis, Mobile Agent Security, Special publication 800-19, National Institute of Standards and Technology (NIST), 1999.
  • 20
    • 27544467699 scopus 로고    scopus 로고
    • The security hole in WAP: an analysis of the network and business rationales underlying a failure
    • Summer
    • Juul N.C., and Jørgensen N. The security hole in WAP: an analysis of the network and business rationales underlying a failure. International Journal of Electronic Commerce 7 4 (2003) 73 Summer
    • (2003) International Journal of Electronic Commerce , vol.7 , Issue.4 , pp. 73
    • Juul, N.C.1    Jørgensen, N.2
  • 21
    • 0010117897 scopus 로고    scopus 로고
    • T.S. Loon, V. Bharghavan, Alleviating the latency and bandwidth problems in WWW browsing, in: USENIX Symposium on Internet Technologies and Systems, 1997.
  • 22
    • 85015667755 scopus 로고    scopus 로고
    • Y. Minsky, R. van Renesse, F. Schneider, S.D. Stoller, Cryptographic support for fault-tolerant distributed computing, in: Seventh ACM SIGOPS European Workshop, 1996.
  • 23
    • 84888791839 scopus 로고    scopus 로고
    • J.L. Muñoz, J. Forné, Evaluation of Certificate Revocation Policies: OCSP vs. Overissued CRL, in: DEXA Workshops 2002. Workshop on Trust and Privacy in Digital Business (TrustBus02), pp. 511-515, IEEE Computer Society, 2002.
  • 24
    • 0242372132 scopus 로고    scopus 로고
    • Using OCSP to secure certificate-using transactions in m-commerce
    • Applied Cryptography and Network Security, Springer-Verlag, Berlin
    • Muñoz J.L., Forné J., Esparza O., Bernabe I., and Soriano M. Using OCSP to secure certificate-using transactions in m-commerce. Applied Cryptography and Network Security. LNCS vol. 2846 (2003), Springer-Verlag, Berlin 280-292
    • (2003) LNCS , vol.2846 , pp. 280-292
    • Muñoz, J.L.1    Forné, J.2    Esparza, O.3    Bernabe, I.4    Soriano, M.5
  • 25
    • 33746162323 scopus 로고    scopus 로고
    • M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, 1999. RFC 2560.
  • 26
    • 0036687237 scopus 로고    scopus 로고
    • Security and usability proposal for mobile electronic commerce
    • Soriano M., and Ponce D. Security and usability proposal for mobile electronic commerce. IEEE Communications Magazine 40 (2002) 62-67
    • (2002) IEEE Communications Magazine , vol.40 , pp. 62-67
    • Soriano, M.1    Ponce, D.2
  • 27
    • 84947921326 scopus 로고    scopus 로고
    • Robust object watermarking: application to code
    • Information Hiding, Springer-Verlag, Berlin
    • Stern J.P., Hachez G., Koeune F., and Quisquater J.J. Robust object watermarking: application to code. Information Hiding. LNCS vol. 1768 (1999), Springer-Verlag, Berlin
    • (1999) LNCS , vol.1768
    • Stern, J.P.1    Hachez, G.2    Koeune, F.3    Quisquater, J.J.4
  • 28
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic traces for mobile agents
    • Mobile Agents and Security, Springer-Verlag, Berlin
    • Vigna G. Cryptographic traces for mobile agents. Mobile Agents and Security. LNCS vol. 1419 (1998), Springer-Verlag, Berlin
    • (1998) LNCS , vol.1419
    • Vigna, G.1
  • 29
    • 33746124916 scopus 로고    scopus 로고
    • ITU/ISO Recommendation X.509, Information technology Open Systems Interconnection - The Directory: Public Key and Attribute Certificate Frameworks, 1997.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.