IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mobile Agent Authentication and Authorization

Mobile Agent Authentication and Authorization
View Sample PDF
Author(s): Sheng-Uei Guan (Brunel University, UK)
Copyright: 2009
Pages: 8
Source title: Encyclopedia of Multimedia Technology and Networking, Second Edition
Source Author(s)/Editor(s): Margherita Pagani (Bocconi University, Italy)
DOI: 10.4018/978-1-60566-014-1.ch126

Purchase

View Mobile Agent Authentication and Authorization on the publisher's website for pricing and purchasing information.

Abstract

With the increasing usage of the Internet, electronic commerce (e-commerce) has been catching on fast in a lot of business areas. As e-commerce booms, there comes a demand for a better system to manage and carry out transactions. This leads to the development of agent-based e-commerce. In this new approach, agents are employed on behalf of users to carry out various e-commerce activities. Although the tradeoff of employing mobile agents is still under debate (Milojicic, 1999), using mobile agents in e-commerce attracts much research effort, as it may improve the potential of their applications in e-commerce (Guan & Yang, 1999, 2004). One advantage of using agents is that communication cost can be reduced. Agents traveling and transferring only necessary information saves network bandwidth and reduces the chances of network congestion. Also, users can schedule their agents to travel asynchronously to the destinations and collect information or execute other applications, while they can disconnect from the network (Wong, Paciorek, & Moore, 1999). Although agent-based technology offers such advantages, the major factor holding people back from employing agents is still the security issues involved. On one hand, hosts cannot trust incoming agents belonging to unknown owners, because malicious agents may launch attacks on the hosts and other agents. On the other hand, agents may also have concerns on the reliability of hosts and will be reluctant to expose their secrets to distrustful hosts. To build bilateral trust in an e-commerce environment, the authorization and authentication schemes for mobile agents should be designed well. Authentication checks the credentials of an agent before processing an agent’s requests. If the agent is found to be suspicious, the host may decide to deny its service requests. Authorization refers to the permissions granted for the agent to access whichever resources it requested.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom