-
1
-
-
84902505974
-
An overview of security issues and techniques in mobile agents
-
Alfalayleh, M. and Brankovic, L. (2004), “An overview of security issues and techniques in mobile agents”, Proceedings of the Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS2004), Windermere, Vol. 175, pp. 59-78.
-
(2004)
Proceedings of the Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS2004), Windermere
, vol.175
, pp. 59-78
-
-
Alfalayleh, M.1
Brankovic, L.2
-
2
-
-
39749163072
-
Privacy and forensics investigation process: the ERPINA protocol
-
Antoniou, G., Leon, S., Stefanos, G. and Paramalli, U. (2008), “Privacy and forensics investigation process: the ERPINA protocol”, Journal of Computer Science & Interface, Vol. 30 No. 4, pp. 229-236.
-
(2008)
Journal of Computer Science & Interface
, vol.30
, Issue.4
, pp. 229-236
-
-
Antoniou, G.1
Leon, S.2
Stefanos, G.3
Paramalli, U.4
-
3
-
-
84993017714
-
A user-centric anonymous authorisation framework in e-commerce environment
-
Au, R., Vasanta, H., Choo, K.R. and Looi, M. (2008), “A user-centric anonymous authorisation framework in e-commerce environment”, Proceedings of Sixth International Conference in Electronic Commerce, Delft, pp. 138-147.
-
(2008)
Proceedings of Sixth International Conference in Electronic Commerce, Delft
, pp. 138-147
-
-
Au, R.1
Vasanta, H.2
Choo, K.R.3
Looi, M.4
-
4
-
-
0032131072
-
The emerging role of electronic marketplaces on the internet
-
Bakos, Y. (1998), “The emerging role of electronic marketplaces on the internet”, Communications of the ACM, Vol. 41 No. 8, pp. 35-42.
-
(1998)
Communications of the ACM
, vol.41
, Issue.8
, pp. 35-42
-
-
Bakos, Y.1
-
5
-
-
0029714307
-
An efficient fair payment system
-
Camenisch, J., Piveteau, J.-M. and Stadler, M. (1996), “An efficient fair payment system”, Proceedings of the 3rd ACM Conference on Computer and Communication Security, New Delhi, pp. 88-94.
-
(1996)
Proceedings of the 3rd ACM Conference on Computer and Communication Security, New Delhi
, pp. 88-94
-
-
Camenisch, J.1
Piveteau, J.-M.2
Stadler, M.3
-
6
-
-
3042642695
-
Getting physical with the digital investigation process
-
Carrier, B. and Spafford, E.H. (2003), “Getting physical with the digital investigation process”, International Journal of Digital Evidence, Vol. 2 No. 2, p. 20.
-
(2003)
International Journal of Digital Evidence
, vol.2
, Issue.2
, pp. 20
-
-
Carrier, B.1
Spafford, E.H.2
-
7
-
-
77954805399
-
Research on applied technology of mobile agent in electronic business
-
Chen, N.J., Huang, S.Z. and Su, D.F. (2000), “Research on applied technology of mobile agent in electronic business”, Journal of Information Technology and Informatization, Vol. 2 No. 12, pp. 48-50.
-
(2000)
Journal of Information Technology and Informatization
, vol.2
, Issue.12
, pp. 48-50
-
-
Chen, N.J.1
Huang, S.Z.2
Su, D.F.3
-
8
-
-
0347796159
-
A supplier-driven electronic marketplace using mobile agents
-
Dasgupta, P., Narasimhan, N., Moser, L.E. and Melliar-Smith, P.M. (1998), “A supplier-driven electronic marketplace using mobile agents”, Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce, Nashville, TN, USA, pp. 42-50.
-
(1998)
Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce, Nashville, TN, USA
, pp. 42-50
-
-
Dasgupta, P.1
Narasimhan, N.2
Moser, L.E.3
Melliar-Smith, P.M.4
-
10
-
-
84993005245
-
An agent-oriented marketplace architecture for enterprise integration
-
Vols. I-V Idea Group London
-
Ghenniwa, H.H. and Huhns, M.N. (2005), “An agent-oriented marketplace architecture for enterprise integration”, in Ed. Khosrow-Pour, M. (Ed.), The Encyclopedia of Information Science and Technology, Vols. I-V, Idea Group, London, pp. 1899-905.
-
(2005)
The Encyclopedia of Information Science and Technology
, pp. 1899-1905
-
-
Ghenniwa, H.H.1
Huhns, M.N.2
Khosrow-Pour, M.3
-
11
-
-
77954764802
-
Research on computer dynamic forensic in e-marketplace environment
-
Hao, G.Y. and Liu, F. (2006), “Research on computer dynamic forensic in e-marketplace environment”, Market Modernization, Vol. 32 No. 15, pp. 126-8.
-
(2006)
Market Modernization
, vol.32
, Issue.15
, pp. 126-128
-
-
Hao, G.Y.1
Liu, F.2
-
12
-
-
24944578141
-
Enterprise Privacy Authorization Language (EPAL), Version 1.2
-
IBM submitted to the W3C, available at: (accessed June 15, 2009).
-
IBM (2003), “Enterprise Privacy Authorization Language (EPAL), Version 1.2”, submitted to the W3C, available at: www.w3.org/Submission/2003/SUBM-EPAL-20031110/ (accessed June 15, 2009).
-
(2003)
-
-
-
13
-
-
77954807970
-
Aglet Workbench [EB/OL]
-
IBM available at: (accessed August 12, 2009).
-
IBM (2004), “Aglet Workbench [EB/OL]”, available at: www.trl.ibm.co.jp/aglets/ (accessed August 12, 2009).
-
(2004)
-
-
-
14
-
-
39749129337
-
Secure and auditable agent-based e-marketplace framework for mobile users
-
Jailani, N., Yatim, N.F.M., Yahya, Y., Patel, A. and Othman, M. (2008), “Secure and auditable agent-based e-marketplace framework for mobile users”, Journal of Computer Science & Interface, Vol. 30 No. 4, pp. 237-252.
-
(2008)
Journal of Computer Science & Interface
, vol.30
, Issue.4
, pp. 237-252
-
-
Jailani, N.1
Yatim, N.F.M.2
Yahya, Y.3
Patel, A.4
Othman, M.5
-
15
-
-
24344446965
-
Computer forensics
-
available at: (accessed September 2, 2009).
-
James, A., Whittaker, J.A. and Howard, M. (2005), “Computer forensics”, On-line IEEE Security and Privacy, available at: www.scmagazine.com/scmagazine/2000_09/survey/survey.html (accessed September 2, 2009).
-
(2005)
On-line IEEE Security and Privacy
-
-
James, A.1
Whittaker, J.A.2
Howard, M.3
-
16
-
-
77954786520
-
A model for mobile agent security in e-business applications
-
Kannammal, A. and Iyengar, N.Ch.S.N. (2007), “A model for mobile agent security in e-business applications”, International Journal of Business and Information, Vol. 2 No. 2, pp. 185-198.
-
(2007)
International Journal of Business and Information
, vol.2
, Issue.2
, pp. 185-198
-
-
Kannammal, A.1
Iyengar, N.C.S.N.2
-
17
-
-
47349102975
-
Internet forensics: legal and technical issues
-
Karyda, M. and Mitrou, L. (2007), “Internet forensics: legal and technical issues”, Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos, pp. 3-12.
-
(2007)
Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos
, pp. 3-12
-
-
Karyda, M.1
Mitrou, L.2
-
18
-
-
77954801917
-
Lectures note on distributed systems: process synchronization and election algorithms
-
available at: mutex.pdf (accessed October 16, 2008).
-
Krzyzanowski, P. (2000), “Lectures note on distributed systems: process synchronization and election algorithms”, available at: www.cs.rutgers.edu/∼pxk/rutgers/notes/content/06- mutex.pdf (accessed October 16, 2008).
-
(2000)
-
-
Krzyzanowski, P.1
-
19
-
-
0347273061
-
-
Pearson Education New Delhi
-
Laudon, C.K. and Traver, C. (2002), E-commerce: Business, Technology, Society, Pearson Education, New Delhi, p. 800.
-
(2002)
E-commerce: Business, Technology, Society
, pp. 800
-
-
Laudon, C.K.1
Traver, C.2
-
20
-
-
58049090940
-
An agent-based micropayment system for e-commerce
-
Springer Berlin
-
Lee, T.O., Yip, Y.L., Tsang, C.M. and Ng, K.W. (2001), “An agent-based micropayment system for e-commerce”, in Ed. Liu, J. and Ed. Ye, Y. (Eds), E-commerce Agents. Lecture Notes in Artificial Intelligence, Vol. 2033, Springer, Berlin, pp. 247-263.
-
(2001)
E-commerce Agents. Lecture Notes in Artificial Intelligence
, vol.2033
, pp. 247-263
-
-
Lee, T.O.1
Yip, Y.L.2
Tsang, C.M.3
Ng, K.W.4
Liu, J.5
Ye, Y.6
-
21
-
-
0036817246
-
Research on the security of mobile agent-based system
-
Li, X., Lu, J., Cao, C., Feng, Y.X. and Tao, X.P. (2001), “Research on the security of mobile agent-based system”, Journal of Software, Vol. 13 No. 10, pp. 1991-2000.
-
(2001)
Journal of Software
, vol.13
, Issue.10
, pp. 1991-2000
-
-
Li, X.1
Lu, J.2
Cao, C.3
Feng, Y.X.4
Tao, X.P.5
-
22
-
-
77954801347
-
Trends and issues in crime and criminal justice
-
Mc Kemmish, R. (1999), “Trends and issues in crime and criminal justice”, Australian Institute of Criminology, Vol. 118, pp. 37-47.
-
(1999)
Australian Institute of Criminology
, vol.118
, pp. 37-47
-
-
Mc Kemmish, R.1
-
23
-
-
84904387968
-
Making software agents user-friendly
-
96.
-
Mahmoud, Q.H. and Yu, L. (2006), “Making software agents user-friendly”, Computer, Vol. 39 No. 7, pp. 94-5, 96.
-
(2006)
Computer
, vol.39
, Issue.7
, pp. 94-95
-
-
Mahmoud, Q.H.1
Yu, L.2
-
24
-
-
77954782300
-
Netcash: a design for practical electronic currency on the internet
-
pp.
-
Medvinsky, G. and Neuman, B.C. (1993), “Netcash: a design for practical electronic currency on the internet”, ACM SIGSAC, November pp. 1026-106.
-
(1993)
ACM SIGSAC
, Issue.November
, pp. 1026-1106
-
-
Medvinsky, G.1
Neuman, B.C.2
-
25
-
-
77954804880
-
Concept of mobile agent-based electronic marketplace – safety measure
-
I-Lee Business Science Reference IGI Global Hershey, PA
-
Patel, A. (2010), “Concept of mobile agent-based electronic marketplace – safety measure”, in Ed. I-Lee (Ed.), Encyclopedia of E-business Development and Management in the Digital Economy, Business Science Reference, Vol. 1, IGI Global, Hershey, PA, pp. 252-264.
-
(2010)
Encyclopedia of E-business Development and Management in the Digital Economy
, vol.1
, pp. 252-264
-
-
Patel, A.1
-
26
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A. and Adleman, L. (1978), “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21 No. 2, pp. 120-6.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
27
-
-
82255175236
-
Security communication architecture for mobile agents and e-commerce
-
Song, R. and Korba, L. (2003), “Security communication architecture for mobile agents and e-commerce”, Proceedings of the 2003 International Work shop on Mobile Systems, E-Commerce and Agent Technology (MSEAT'2003), Miami, FL.
-
(2003)
Proceedings of the 2003 International Work shop on Mobile Systems, E-Commerce and Agent Technology (MSEAT'2003), Miami, FL
-
-
Song, R.1
Korba, L.2
-
28
-
-
0036870198
-
Network forensics analysis
-
Vicka, C., Charles, P., Sybil, S., Greenbergichael, S. and Van, B.J. (2002), “Network forensics analysis”, IEEE Computer Society, Vol. 6 No. 6, pp. 60-66.
-
(2002)
IEEE Computer Society
, vol.6
, Issue.6
, pp. 60-66
-
-
Vicka, C.1
Charles, P.2
Sybil, S.3
Greenbergichael, S.4
Van, B.J.5
-
29
-
-
44949164144
-
Dynamic network forensics based on immune agent
-
Wang, D.G., Li, T. and Liu, S. (2007), “Dynamic network forensics based on immune agent”, Journal of Wuhan University: Natural Science Edition, Vol. 52 No. 5, pp. 527-531.
-
(2007)
Journal of Wuhan University: Natural Science Edition
, vol.52
, Issue.5
, pp. 527-531
-
-
Wang, D.G.1
Li, T.2
Liu, S.3
-
30
-
-
77954787813
-
Research of mobile agent-based security in the e-commerce
-
Wang, R.Y., Liang, L. and Liu, W.F. (2004), “Research of mobile agent-based security in the e-commerce”, Journal of Application Research of Computers, Vol. 11 No. 8, pp. 137-8.
-
(2004)
Journal of Application Research of Computers
, vol.11
, Issue.8
, pp. 137-138
-
-
Wang, R.Y.1
Liang, L.2
Liu, W.F.3
-
31
-
-
84993033894
-
Computer forensics technology of criminal activities in communication networks
-
Wang, Y.Q. (2006), “Computer forensics technology of criminal activities in communication networks”, Journal of Telecommunications Science, Vol. 22 No. 6, pp. 63-66.
-
(2006)
Journal of Telecommunications Science
, vol.22
, Issue.6
, pp. 63-66
-
-
Wang, Y.Q.1
-
32
-
-
0037812406
-
A model and its protocols of distributed electronic bank based on mobile agent
-
Wen, T., Wang, J.Y. and Liu, J.R. (2004), “A model and its protocols of distributed electronic bank based on mobile agent”, Journal of Mini-micro Systems, Vol. 24 No. 3, pp. 331-5.
-
(2004)
Journal of Mini-micro Systems
, vol.24
, Issue.3
, pp. 331-335
-
-
Wen, T.1
Wang, J.Y.2
Liu, J.R.3
-
33
-
-
84992959754
-
Mobile agent-based encryption transmission system
-
Yu, B. and Li, X. (2006), “Mobile agent-based encryption transmission system”, National Computer System Software Annual Meeting, Washington, DC, pp. 24-34.
-
(2006)
National Computer System Software Annual Meeting, Washington, DC
, pp. 24-34
-
-
Yu, B.1
Li, X.2
-
34
-
-
77954769374
-
Security model of mobile agent in e-commerce
-
Zhang, D.L. and Lin, C. (2005), “Security model of mobile agent in e-commerce”, China Academic Journal Electronic Publishing House, Vol. 25 No. 6, pp. 1271-3.
-
(2005)
China Academic Journal Electronic Publishing House
, vol.25
, Issue.6
, pp. 1271-1273
-
-
Zhang, D.L.1
Lin, C.2
-
35
-
-
77954807720
-
Research on secure mobile agent-based electronic commerce
-
Zhao, S.H., Xin, F.Q. and Ma, J.Z. (2007), “Research on secure mobile agent-based electronic commerce”, Journal of Science and Technology Information, Vol. 2, pp. 10-11.
-
(2007)
Journal of Science and Technology Information
, vol.2
, pp. 10-11
-
-
Zhao, S.H.1
Xin, F.Q.2
Ma, J.Z.3
-
36
-
-
84993017629
-
Mobile agent-based cooperative e-commerce security authentication mechanism
-
Zhou, K.J. (2007), “Mobile agent-based cooperative e-commerce security authentication mechanism”, Journal of Computer Engineering, Vol. 33 No. 9, pp. 171-3.
-
(2007)
Journal of Computer Engineering
, vol.33
, Issue.9
, pp. 171-173
-
-
Zhou, K.J.1
-
37
-
-
77954787814
-
Electronic cheque architecture
-
Tech. Rep. Version 1.0.2 Financial Services Technology Consortium Santa Rosa, CA
-
Anderson, M.M. (1998), “Electronic cheque architecture”, Financial Services Technology Consortium, Tech. Rep. Version 1.0.2, Financial Services Technology Consortium, Santa Rosa, CA.
-
(1998)
Financial Services Technology Consortium
-
-
Anderson, M.M.1
-
38
-
-
0010280770
-
An efficient off-line electronic cash system based on the representation problem
-
Technical Report CS-R9323 CWI Amsterdam
-
Brands, S. (1993), “An efficient off-line electronic cash system based on the representation problem”, Technical Report CS-R9323, CWI, Amsterdam.
-
(1993)
-
-
Brands, S.1
-
39
-
-
84898136799
-
Concept of mobile agent-based electronic marketplace
-
I-Lee Business Science Reference IGI Global Hershey, PA
-
Jailani, N., Ahmed, P., Muriati, M., Salha, A. and Yazrina, Y. (2010), “Concept of mobile agent-based electronic marketplace”, in Ed. I-Lee (Ed.), Encyclopedia of E-business Development and Management in the Digital Economy, Business Science Reference, IGI Global, Hershey, PA.
-
(2010)
Encyclopedia of E-business Development and Management in the Digital Economy
-
-
Jailani, N.1
Ahmed, P.2
Muriati, M.3
Salha, A.4
Yazrina, Y.5
-
40
-
-
77954813052
-
A migration mechanism of mobile agent system supporting security and fault-tolerance
-
Wang, Y., Wang, Z.Q. and Wei, L.F. (2007), “A migration mechanism of mobile agent system supporting security and fault-tolerance”, Journal of Computer Technology and Development, Vol. 17 No. 3, pp. 169-175.
-
(2007)
Journal of Computer Technology and Development
, vol.17
, Issue.3
, pp. 169-175
-
-
Wang, Y.1
Wang, Z.Q.2
Wei, L.F.3
|