메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 252-264

Concept of mobile agent based electronic marketplace safety measures

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77954804880     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61520-611-7.ch025     Document Type: Chapter
Times cited : (13)

References (18)
  • 2
    • 77957787468 scopus 로고    scopus 로고
    • An overview of security issues and techniques in mobile agents
    • In edited book by IFIP (International Federation for Information Processing), Springer Boston, 1571-5736 (Print) 1861-2288, October 2005
    • Alfalayleh, M., & Brankovic, L. (2005). An Overview of Security Issues and Techniques in Mobile Agents. In edited book by IFIP (International Federation for Information Processing), Communications and Multimedia Security, Springer Boston, 1571-5736 (Print) 1861-2288, October 2005.
    • (2005) Communications and Multimedia Security
    • Alfalayleh, M.1    Brankovic, L.2
  • 3
    • 39749163072 scopus 로고    scopus 로고
    • Privacy and forensics investigation process: The ERPINA protocol
    • doi:10.1016/j.csi.2007.10.008
    • Antoniou, G., Sterling, L., Gritzalis, S., & Udaya, P. (2008). Privacy and forensics investigation process: The ERPINA Protocol. Computer Standards & Interfaces, 30(4), 229-236. doi:10.1016/j.csi.2007.10.008
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.4 , pp. 229-236
    • Antoniou, G.1    Sterling, L.2    Gritzalis, S.3    Udaya, P.4
  • 6
    • 84937558604 scopus 로고    scopus 로고
    • Privacy incorporated software agent (PISA), proposal for building a privacy guardian for the electronic age
    • doi:10.1007/3-540-44702-4_8
    • Borking, J. J. (2009). Privacy Incorporated Software Agent (PISA), Proposal for Building a Privacy Guardian for the Electronic Age. Lecture Notes in Computer Science, 2009, 130. doi:10.1007/3-540-44702-4_8
    • (2009) Lecture Notes in Computer Science, 2009 , pp. 130
    • Borking, J.J.1
  • 8
    • 84898143510 scopus 로고    scopus 로고
    • Computer security, privacy and politics: Current issues, challenges and solutions
    • In I. Lee (Ed.), Hershey, PA: IGI
    • Clarke, R. (2008). Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions. In I. Lee (Ed.), Electronic Business: Concepts, Methodologies, Tools, and Applications (Vol. 4). Hershey, PA: IGI.
    • (2008) Electronic Business: Concepts, Methodologies, Tools, and Applications , vol.4
    • Clarke, R.1
  • 10
    • 39749129337 scopus 로고    scopus 로고
    • Secure and auditable AgentBased E-marketplace framework for mobile users
    • doi:10.1016/j.csi.2007.10.009
    • Jailani, N., Yatim, N. F. M., Yahya, Y., Patel, A., & Othman, M. (2008). Secure and Auditable AgentBased E-marketplace Framework for Mobile Users. Computer Standards & Interfaces, 30(4), 237-252. doi:10.1016/j.csi.2007.10.009
    • (2008) Computer Standards & Interfaces , vol.30 , Issue.4 , pp. 237-252
    • Jailani, N.1    Yatim, N.F.M.2    Yahya, Y.3    Patel, A.4    Othman, M.5
  • 11
    • 40949151220 scopus 로고    scopus 로고
    • A partial equilibrium view on security and privacy
    • Retrieved from
    • Katos, V., & Patel, A. (2008). A Partial Equilibrium View on Security and Privacy, Information Management and Computer Security, 16(1), 74-83. Retrieved from http://www.emeraldinsight.com/0968-5227.htm
    • (2008) Information Management and Computer Security , vol.16 , Issue.1 , pp. 74-83
    • Katos, V.1    Patel, A.2
  • 12
    • 31144445731 scopus 로고    scopus 로고
    • Technical challenges of network anonymity
    • doi:10.1016/j.comcom.2004.12.011
    • Kesdogan, D., & Palmer, C. (2006). Technical challenges of network anonymity. Computer Communications, 29(3), 306-324. doi:10.1016/j.comcom.2004.12.011
    • (2006) Computer Communications , vol.29 , Issue.3 , pp. 306-324
    • Kesdogan, D.1    Palmer, C.2
  • 13
    • 0030233817 scopus 로고    scopus 로고
    • Software agents: An overview
    • doi:10.1017/S026988890000789X
    • Nwana, H. S. (1996). Software Agents: An Overview. The Knowledge Engineering Review, 11(3), 1-40. doi:10.1017/S026988890000789X
    • (1996) The Knowledge Engineering Review , vol.11 , Issue.3 , pp. 1-40
    • Nwana, H.S.1
  • 17
    • 84972263711 scopus 로고
    • Intelligent agents: Theory and practice
    • doi:10.1017/S0269888900008122
    • Wooldridge, M., & Jennings, N. R. (1995). Intelligent agents: Theory and practice. The Knowledge Engineering Review, 10(2), 115-152. doi:10.1017/S0269888900008122
    • (1995) The Knowledge Engineering Review , vol.10 , Issue.2 , pp. 115-152
    • Wooldridge, M.1    Jennings, N.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.