메뉴 건너뛰기




Volumn 30, Issue 4, 2008, Pages 237-252

Secure and auditable agent-based e-marketplace framework for mobile users

Author keywords

Agents; Audit; Forensics; Privacy; Protocols; Security

Indexed keywords

DATA PRIVACY; INTERNET PROTOCOLS; MOBILE AGENTS; USER INTERFACES;

EID: 39749129337     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2007.10.009     Document Type: Article
Times cited : (18)

References (15)
  • 3
    • 0039101918 scopus 로고    scopus 로고
    • Trust and traceability in electronic commerce
    • Steinauer D.D., Wakid S.A., and Rasberry S. Trust and traceability in electronic commerce. Standard View 5 3 (September/1997) 118-124
    • (1997) Standard View , vol.5 , Issue.3 , pp. 118-124
    • Steinauer, D.D.1    Wakid, S.A.2    Rasberry, S.3
  • 4
    • 47349132849 scopus 로고    scopus 로고
    • G. Antoniou, and S. Gritzalis, RPINA: Network Forensics protocol embedding Privacy Enhancing Technologies, Proceedings of the ISCIT International Symposium on Communications and Information Technologies, A. Taguchi et al. ed., October 2006, Bangkok, Thailand, ISBN: 0-7803-9741-X, (IEEE Press, 2006) 1-6.
    • G. Antoniou, and S. Gritzalis, RPINA: Network Forensics protocol embedding Privacy Enhancing Technologies, Proceedings of the ISCIT International Symposium on Communications and Information Technologies, A. Taguchi et al. ed., October 2006, Bangkok, Thailand, ISBN: 0-7803-9741-X, (IEEE Press, 2006) 1-6.
  • 6
    • 84937558604 scopus 로고    scopus 로고
    • Privacy incorporated software agent (PISA): proposal for building a privacy guardian for the electronic age
    • Federrath H. (Ed), Springer, Berlin
    • Borking J.J. Privacy incorporated software agent (PISA): proposal for building a privacy guardian for the electronic age. In: Federrath H. (Ed). Anonymity 2000, Lecture Notes in Computer Science vol. 2009 (2001), Springer, Berlin 130-140
    • (2001) Anonymity 2000, Lecture Notes in Computer Science , vol.2009 , pp. 130-140
    • Borking, J.J.1
  • 9
    • 33744499088 scopus 로고    scopus 로고
    • Malicious code moves to mobile devices
    • Leavitt N. Malicious code moves to mobile devices. IEEE Computer (December 2000) 16-19
    • (2000) IEEE Computer , pp. 16-19
    • Leavitt, N.1
  • 10
    • 77954474147 scopus 로고    scopus 로고
    • A user-centric anonymous authorisation framework in e-commerce environment in Janssen
    • Sol M.H.J., and Wagenaar R.W. (Eds)
    • Au R., Vasanta H., Choo K.R., and Looi M. A user-centric anonymous authorisation framework in e-commerce environment in Janssen. In: Sol M.H.J., and Wagenaar R.W. (Eds). Sixth International Conference on Electronic Commerce (2004) 138-147
    • (2004) Sixth International Conference on Electronic Commerce , pp. 138-147
    • Au, R.1    Vasanta, H.2    Choo, K.R.3    Looi, M.4
  • 14
    • 0032131072 scopus 로고    scopus 로고
    • The emerging role of electronic marketplaces on the Internet
    • Bakos Y. The emerging role of electronic marketplaces on the Internet. Communications of the ACM 41 8 (1998) 35-42
    • (1998) Communications of the ACM , vol.41 , Issue.8 , pp. 35-42
    • Bakos, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.