{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T17:10:29Z","timestamp":1738429829592,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540880707"},{"type":"electronic","value":"9783540880714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88071-4_13","type":"book-chapter","created":{"date-parts":[[2008,10,9]],"date-time":"2008-10-09T07:37:41Z","timestamp":1223537861000},"page":"303-329","source":"Crossref","is-referenced-by-count":0,"title":["Security of Intelligent Agents in the Web-Based Applications"],"prefix":"10.1007","author":[{"given":"Chung-Ming","family":"Ou","sequence":"first","affiliation":[]},{"given":"C. R.","family":"Ou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1016\/j.jnca.2006.04.008","volume":"30","author":"A. Ouardani","year":"2007","unstructured":"Ouardani, A., Pierre, S., Boucheneb, H.: A Security Protocol for Mobile Agents based Upon the Cooperation of Sedentary Agents. J. Network and Computer Applications\u00a030, 1228\u20131243 (2007)","journal-title":"J. Network and Computer Applications"},{"volume-title":"Multiagent Systems, A modern approach to distributed artificial intelligence","year":"1999","key":"13_CR2","unstructured":"Weiss, G. (ed.): Multiagent Systems, A modern approach to distributed artificial intelligence. MIT Press, Cambridge (1999)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-540-45347-5_6","volume-title":"Agent Systems, Mobile Agents, and Applications","author":"H. Pagnia","year":"2000","unstructured":"Pagnia, H., Vogt, H., Gartner, F., Wilhelm, U.: Solving Fair Exchange with Mobile Agents. In: Kotz, D., Mattern, F. (eds.) MA 2000, ASA\/MA 2000, and ASA 2000. LNCS, vol.\u00a01882, pp. 57\u201372. Springer, Heidelberg (2000)"},{"key":"13_CR4","unstructured":"Wilhelm, U., Staamann, S., Buttyan, L.: On the Problem of Trust in Mobile Agent Systems. In: Symposium on Network and Distributed System Security, Internet Society, pp. 114\u2013124 (1998)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45068-8_54","volume-title":"Web Engineering","author":"O. Esparza","year":"2003","unstructured":"Esparza, O., Munoz, J., Soriano, M., Forne, J.: Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. In: Cueva Lovelle, J.M., Rodr\u00edguez, B.M.G., Gayo, J.E.L., del Ruiz, M.P.P., Aguilar, L.J. (eds.) ICWE 2003. LNCS, vol.\u00a02722, pp. 289\u2013292. Springer, Heidelberg (2003)"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-48970-3_21","volume-title":"Information Security and Privacy","author":"J. Zhou","year":"1999","unstructured":"Zhou, J., Deng, R., Bao, F.: Evolution of Fair Non-repudiation with TTP. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol.\u00a01587, pp. 258\u2013269. Springer, Heidelberg (1999)"},{"key":"13_CR7","unstructured":"ITU-T, Recommendation, X.813: Information Technology-Open Systems Interconnection- Security Frameworks in Open Systems, Non-repudiation Framework (1996)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Li, B., Luo, J.: On Timeliness of a Fair Non-repudiation Protocol. In: InfoSecu 2004, pp. 99\u2013106 (2004)","DOI":"10.1145\/1046290.1046311"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1016\/S0140-3664(00)00253-X","volume":"23","author":"W. Jansen","year":"2000","unstructured":"Jansen, W.: Countermeasures for Mobile Agent Security. Computer Communications\u00a023, 1667\u20131676 (2000)","journal-title":"Computer Communications"},{"key":"13_CR10","unstructured":"Zhang, M., Karmouch, A.: Adding Security Features to FIPA Agent Platform (2001), http:\/\/www2.elec.qmul.ac.uk\/~stefan\/fipa-security\/rfi-response\/Karmouth-FIPA-Security-Journal.pdf"},{"key":"13_CR11","unstructured":"Deng, X.: A Comparison of the Security Frameworks in Agent-Based Semantic Web. 20th Computer Science Seminar, SC2-T4-1"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Jansen, W., Karygiannis, T.: NIST Special Publication 800-19: Mobile Agent Security (1999)","DOI":"10.6028\/NIST.SP.800-19"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Ou, C.-M., Ou, C.R.: Adaptation of Proxy Certificates to Non-Repudiation Protocol of Agent-based Mobile Payment Systems. Applied Intelligence (Accepted and online first) DOI: 10.1007\/s10489-007-0089-4","DOI":"10.1007\/s10489-007-0089-4"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Ma, L., Tsai, J.: Security Modeling and Analysis of Mobile Agent Systems. Imperial College Press (2006)","DOI":"10.1142\/p435"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1023\/A:1023474906451","volume":"3","author":"Y.-J. Hu","year":"2003","unstructured":"Hu, Y.-J.: Trusted Agent-mediated E-commerce Transaction Services via Digital Certificate Management. Electronic Commerce Research\u00a03, 221\u2013243 (2003)","journal-title":"Electronic Commerce Research"},{"issue":"4","key":"13_CR16","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems; Theory and Practice. ACM Trans. Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Trans. Computer Systems"},{"key":"13_CR17","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-45370-9_13","volume-title":"E-Commerce Agents","author":"A. Romao","year":"2001","unstructured":"Romao, A., da Silva, M.: Secure Mobile Agent Digital Signatures with Proxy Certificates. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol.\u00a02033, pp. 206\u2013220. Springer, Heidelberg (2001)"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","first-page":"415","volume-title":"Theoretical Aspects of Computer Software","author":"S. Ugurlu","year":"1997","unstructured":"Ugurlu, S., Erdogan, N.: Comparing Object Encodings. In: Ito, T., Abadi, M. (eds.) TACS 1997. LNCS, vol.\u00a01281, pp. 415\u2013438. Springer, Heidelberg (1997)"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","first-page":"1215","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"Y.-J. Hu","year":"2003","unstructured":"Hu, Y.-J., Tang, C.-W.: Agent-oriented Public Key Infrastructure for Multi-agent E-service. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol.\u00a02773, pp. 1215\u20131221. Springer, Heidelberg (2003)"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/S1571-0661(04)80339-6","volume":"63","author":"W.A. Jansen","year":"2002","unstructured":"Jansen, W.A.: A Privilege Management Scheme for Mobile Agent Systems. Electronic Notes in Theoretical Computer Science\u00a063, 91\u2013107 (2002)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"13_CR21","unstructured":"IETF RFC 3281: An Internet Attribute Certificate Profile for Authorization"},{"key":"13_CR22","unstructured":"Information Technology-Open Systems Interconnection-Security Frameworks for Open Systems: Access Control Framework, ISO\/IEC 10181-3:1996"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, J., Gollmann, D.: A Fair Non-repudiation Protocol. In: Proc 1996 IEEE Symposium on Security and Privacy, pp. 55\u201361 (1996)","DOI":"10.1109\/SECPRI.1996.502669"},{"issue":"1","key":"13_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TWC.2004.840220","volume":"4","author":"W.-B. Lee","year":"2005","unstructured":"Lee, W.-B., Yeh, C.-K.: A New Delegation-based Authentication Protocol for Use in Portable Communication Systems. IEEE Trans. Wireless Communications\u00a04(1), 57\u201364 (2005)","journal-title":"IEEE Trans. Wireless Communications"},{"key":"13_CR25","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-540-72830-6_31","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"C.-M. Ou","year":"2007","unstructured":"Ou, C.-M., Ou, C.R.: Non-Repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI. In: Nguyen, N.T., Grzech, A., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2007. LNCS (LNAI), vol.\u00a04496, pp. 298\u2013307. Springer, Heidelberg (2007)"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.1016\/j.comcom.2006.03.005","volume":"29","author":"O. Esparza","year":"2006","unstructured":"Esparza, O., Munoz, J., Soriano, M., Forne, J.: Secure Brokerage Mechanisms for Mobile Electronic Commerce. Computer Communications\u00a029, 2308\u20132321 (2006)","journal-title":"Computer Communications"},{"key":"13_CR27","volume-title":"Cryptography and Network Security","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice Hall, Englewood Cliffs (2003)","edition":"3"},{"key":"13_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/BFb0053403","volume-title":"Trends in Distributed Systems for Electronic Commerce","author":"A. Romao","year":"1998","unstructured":"Romao, A., Silva, M.: An Agent-based Secure Internet Payment System for Mobile Computing. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol.\u00a01402, pp. 80\u201393. Springer, Heidelberg (1998)"},{"key":"13_CR29","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/A:1008735301014","volume":"8","author":"X. Yi","year":"2000","unstructured":"Yi, X., Siew, C., Wang, X., Okamoto, E.: A Secure Agent-based Framework for Internet Trading in Mobile Computing Environment. Distributed and Parallel Database\u00a08, 85\u2013117 (2000)","journal-title":"Distributed and Parallel Database"},{"key":"13_CR30","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jss.2004.01.008","volume":"75","author":"S. Raghunathan","year":"2005","unstructured":"Raghunathan, S., Mikler, A., Cozzolino, C.: Secure Agent Computation: X.509 Proxy Certificates in a Multi-lingual Agent Framework. J. Systems and Software\u00a075, 125\u2013137 (2005)","journal-title":"J. Systems and Software"},{"key":"13_CR31","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.comcom.2005.01.006","volume":"29","author":"L. Benachenhou","year":"2006","unstructured":"Benachenhou, L., Pierre, S.: Protection of a Mobile Agent with a Reference Clone. Computer Communications\u00a029, 268\u2013278 (2006)","journal-title":"Computer Communications"},{"issue":"2","key":"13_CR32","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.jal.2005.12.015","volume":"5","author":"D. Hutter","year":"2007","unstructured":"Hutter, D., Mantel, H., Schaefer, I., Schairer, A.: Security of Multi-agent Systems: A Case Study on Comparison Shopping. J. Applied Logic\u00a05(2), 303\u2013332 (2007)","journal-title":"J. Applied Logic"},{"key":"13_CR33","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.eswa.2006.01.053","volume":"32","author":"M.H. Kuo","year":"2007","unstructured":"Kuo, M.H.: An Intelligent Agent-based Collaborative Information Security Framework. Expert Systems with Applications\u00a032, 585\u2013598 (2007)","journal-title":"Expert Systems with Applications"},{"key":"13_CR34","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.cose.2006.12.003","volume":"26","author":"X. Vila","year":"2007","unstructured":"Vila, X., Schuster, A., Riera, A.: Security for a Multi-agent System based on JADE. Computer & Security\u00a026, 391\u2013400 (2007)","journal-title":"Computer & Security"},{"key":"13_CR35","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.cose.2004.01.008","volume":"23","author":"M.-H. Lin","year":"2004","unstructured":"Lin, M.-H., Chang, C.-C., Chen, Y.-R.: A Fair and Secure Mobile Agent Environment based on Blind Signature and Proxy Host. Computer & Security\u00a023, 199\u2013212 (2004)","journal-title":"Computer & Security"},{"key":"13_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/3-540-44651-6_26","volume-title":"Mobile Agents for Telecommunication Applications","author":"M. Zhang","year":"2001","unstructured":"Zhang, M., Karmouth, A., Impey, R.: Towards a Secure Agent Platform Based on FIPA. In: Pierre, S., Glitho, R.H. (eds.) MATA 2001. LNCS, vol.\u00a02164, pp. 277\u2013290. Springer, Heidelberg (2001)"},{"key":"13_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-540-32260-3_7","volume-title":"Security Protocols","author":"A. Suna","year":"2005","unstructured":"Suna, A., Fallah-Seghrouchni, A.: A Mobile Agents Platform: Architecture, Mobility and Security Elements. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 126\u2013146. Springer, Heidelberg (2005)"},{"key":"13_CR38","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/3-540-48165-6_8","volume-title":"Intelligent Agents for Telecommunication Applications","author":"K. Bsufka","year":"1999","unstructured":"Bsufka, K., Holst, S., Schnidt, T.: Ralization of an Agent-based Certificate Authority and Key Distribution Center. In: Albayrak, \u015e. (ed.) IATA 1999. LNCS (LNAI), vol.\u00a01699, pp. 113\u2013123. Springer, Heidelberg (1999)"},{"key":"13_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-45415-2_3","volume-title":"Topics in Electronic Commerce","author":"A. Das","year":"2001","unstructured":"Das, A., Yao, G.: A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment. In: Kou, W., Yesha, Y., Tan, C.J.K. (eds.) ISEC 2001. LNCS, vol.\u00a02040, pp. 33\u201341. Springer, Heidelberg (2001)"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Borrel, J., Robles, S., Serra, J., Riera, A.: Securing the Itinerary of Mobile Agents through a Non-Repudiation Protocol. In: Proceedings IEEE 33rd Annual, International Carnahan Conference, pp. 461\u2013464 (1999)","DOI":"10.1109\/CCST.1999.797954"},{"issue":"4","key":"13_CR41","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/S0097-8493(98)00035-1","volume":"22","author":"V. Roth","year":"1998","unstructured":"Roth, V., Jalali-Sohi, M.: Access Control and Key Management for Mobile Agents. Comput. & Graphics\u00a022(4), 457\u2013461 (1998)","journal-title":"Comput. & Graphics"},{"key":"13_CR42","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1002\/wcm.276","volume":"6","author":"C.-C. Chang","year":"2006","unstructured":"Chang, C.-C., Lin, I.-C.: A New Solution for Assigning Cryptographic Keys to Control Access in Mobile Agent Environments. Wireless Communications and Mobile Computing\u00a06, 137\u2013146 (2006)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"13_CR43","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-540-78582-8_58","volume-title":"Agent and Multi-Agent Systems: Technologies and Applications","author":"C.-M. Ou","year":"2008","unstructured":"Ou, C.-M., Ou, C.R.: SETNR\/A: An Agent-based Secure Payment Protocol for Mobile Commerce. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS (LNAI), vol.\u00a04953, pp. 527\u2013536. Springer, Heidelberg (2008)"},{"key":"13_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/3-540-45036-X_53","volume-title":"Web Communication Technologies and Internet-Related Social Issues - HSI 2003","author":"S.-H. Seo","year":"2003","unstructured":"Seo, S.-H., Lee, S.-H.: A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol.\u00a02713, pp. 527\u2013536. Springer, Heidelberg (2003)"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Ou, C.-M., Ou, C.R.: Role-based Access Control (RBAC) Mechanism with Attribute Certificates for Mobile Agent. In: Proceedings of 10th Joint Conference of Information Sciences (JCIS 2007) (2007)","DOI":"10.1142\/9789812709677_0089"},{"key":"13_CR46","doi-asserted-by":"crossref","unstructured":"Liew, C.-C., Ng, W.-K., Lim, E.-P., Tan, B.-S., Ong, K.-L.: Non-Repudiation in an Agent-Based Electronic Commerce System. In: DEXA Workshop, pp. 864\u2013868 (1999)","DOI":"10.1109\/DEXA.1999.795295"}],"container-title":["Studies in Computational Intelligence","Intelligent Agents in the Evolution of Web and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88071-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T16:44:17Z","timestamp":1738428257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88071-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540880707","9783540880714"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88071-4_13","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[]}}