{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:45:32Z","timestamp":1759092332532,"version":"3.41.2"},"reference-count":40,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T00:00:00Z","timestamp":1279584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7,20]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>There is a need to provide secure and safe information security systems through the use of firewalls, intrusion detection and prevention systems, encryption, authentication, and other hardware and software solutions. The purpose of this paper is therefore to propose a framework which includes safe, secure, trusted, and auditable services, as well as forensic mechanisms to provide audit trails for digital evidence of transactions and protection against malicious and illegal activities.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper reviews the literature as the foundation and knowledge base for the proposed framework and system of secure and trustworthy mobile agent (MA)\u2010based e\u2010marketplaces. It consists of the current state of the art taxonomy for the classified MA\u2010based frameworks for e\u2010marketplace trading, underlying supporting systems, e\u2010payment systems, and the essential issues related to auditable and digital forensic services.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The current knowledge shows that there is a serious lack of auditable and digital forensic services to make secure and trustworthy MA\u2010based e\u2010marketplaces systems. The paper draws conclusions and highlights further research work which is ongoing and new work that needs to be performed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper perceives the needs to define the requirements for secure and trustworthy MA\u2010based e\u2010marketplaces and proposes a framework to design effective systems using the latest techniques and technologies.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685221011064681","type":"journal-article","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:05:20Z","timestamp":1278882320000},"page":"144-161","source":"Crossref","is-referenced-by-count":14,"title":["A review and future research directions of secure and trustworthy mobile agent\u2010based e\u2010marketplace systems"],"prefix":"10.1108","volume":"18","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[]},{"given":"Wei","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Wills","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"crossref","unstructured":"Alfalayleh, M. and Brankovic, L. (2004), \u201cAn overview of security issues and techniques in mobile agents\u201d, Proceedings of the Eighth IFIP TC\u20106 TC\u201011 Conference on Communications and Multimedia Security (CMS2004), Windermere, Vol. 175, pp. 59\u201078.","key":"key2022031820214436100_b1","DOI":"10.1007\/0-387-24486-7_5"},{"doi-asserted-by":"crossref","unstructured":"Antoniou, G., Leon, S., Stefanos, G. and Paramalli, U. (2008), \u201cPrivacy and forensics investigation process: the ERPINA protocol\u201d, Journal of Computer Science & Interface, Vol. 30 No. 4, pp. 229\u201036.","key":"key2022031820214436100_b2","DOI":"10.1016\/j.csi.2007.10.008"},{"unstructured":"Au, R., Vasanta, H., Choo, K.R. and Looi, M. (2008), \u201cA user\u2010centric anonymous authorisation framework in e\u2010commerce environment\u201d, Proceedings of Sixth International Conference in Electronic Commerce, Delft, pp. 138\u201047.","key":"key2022031820214436100_b40"},{"doi-asserted-by":"crossref","unstructured":"Bakos, Y. (1998), \u201cThe emerging role of electronic marketplaces on the internet\u201d, Communications of the ACM, Vol. 41 No. 8, pp. 35\u201042.","key":"key2022031820214436100_b4","DOI":"10.1145\/280324.280330"},{"doi-asserted-by":"crossref","unstructured":"Camenisch, J., Piveteau, J.\u2010M. and Stadler, M. (1996), \u201cAn efficient fair payment system\u201d, Proceedings of the 3rd ACM Conference on Computer and Communication Security, New Delhi, pp. 88\u201094.","key":"key2022031820214436100_b39","DOI":"10.1145\/238168.238193"},{"unstructured":"Carrier, B. and Spafford, E.H. (2003), \u201cGetting physical with the digital investigation process\u201d, International Journal of Digital Evidence, Vol. 2 No. 2, p. 20.","key":"key2022031820214436100_b6"},{"unstructured":"Chen, N.J., Huang, S.Z. and Su, D.F. (2000), \u201cResearch on applied technology of mobile agent in electronic business\u201d, Journal of Information Technology and Informatization, Vol. 2 No. 12, pp. 48\u201050.","key":"key2022031820214436100_b7"},{"unstructured":"Dasgupta, P., Narasimhan, N., Moser, L.E. and Melliar\u2010Smith, P.M. (1998), \u201cA supplier\u2010driven electronic marketplace using mobile agents\u201d, Proceedings of the 1st International Conference on Telecommunications and Electronic Commerce, Nashville, TN, USA, pp. 42\u201050.","key":"key2022031820214436100_b8"},{"unstructured":"Drew, G.N. (1999), Using SET for Secure Electronic Commerce, Prentice\u2010Hall, Englewood Cliffs, NJ, p. 265.","key":"key2022031820214436100_b9"},{"doi-asserted-by":"crossref","unstructured":"Ghenniwa, H.H. and Huhns, M.N. (2005), \u201cAn agent\u2010oriented marketplace architecture for enterprise integration\u201d, in Khosrow\u2010Pour, M. (Ed.), The Encyclopedia of Information Science and Technology, Vols. I\u2010V, Idea Group, London, pp. 1899\u2010905.","key":"key2022031820214436100_b10","DOI":"10.4018\/978-1-59140-553-5.ch335"},{"unstructured":"Hao, G.Y. and Liu, F. (2006), \u201cResearch on computer dynamic forensic in e\u2010marketplace environment\u201d, Market Modernization, Vol. 32 No. 15, pp. 126\u20108.","key":"key2022031820214436100_b14"},{"unstructured":"IBM (2003), \u201cEnterprise Privacy Authorization Language (EPAL), Version 1.2\u201d, submitted to the W3C, available at: www.w3.org\/Submission\/2003\/SUBM\u2010EPAL\u201020031110\/ (accessed June 15, 2009).","key":"key2022031820214436100_b16"},{"unstructured":"IBM (2004), \u201cAglet Workbench [EB\/OL]\u201d, available at: www.trl.ibm.co.jp\/aglets\/ (accessed August 12, 2009).","key":"key2022031820214436100_b15"},{"doi-asserted-by":"crossref","unstructured":"Jailani, N., Yatim, N.F.M., Yahya, Y., Patel, A. and Othman, M. (2008), \u201cSecure and auditable agent\u2010based e\u2010marketplace framework for mobile users\u201d, Journal of Computer Science & Interface, Vol. 30 No. 4, pp. 237\u201052.","key":"key2022031820214436100_b11","DOI":"10.1016\/j.csi.2007.10.009"},{"unstructured":"James, A., Whittaker, J.A. and Howard, M. (2005), \u201cComputer forensics\u201d, On\u2010line IEEE Security and Privacy, available at: www.scmagazine.com\/scmagazine\/2000_09\/survey\/survey.html (accessed September 2, 2009).","key":"key2022031820214436100_b13"},{"unstructured":"Kannammal, A. and Iyengar, N.Ch.S.N. (2007), \u201cA model for mobile agent security in e\u2010business applications\u201d, International Journal of Business and Information, Vol. 2 No. 2, pp. 185\u201098.","key":"key2022031820214436100_b17"},{"doi-asserted-by":"crossref","unstructured":"Karyda, M. and Mitrou, L. (2007), \u201cInternet forensics: legal and technical issues\u201d, Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos, pp. 3\u201012.","key":"key2022031820214436100_b18","DOI":"10.1109\/WDFIA.2007.4299368"},{"unstructured":"Krzyzanowski, P. (2000), \u201cLectures note on distributed systems: process synchronization and election algorithms\u201d, available at: www.cs.rutgers.edu\/\u223cpxk\/rutgers\/notes\/content\/06\u2010 mutex.pdf (accessed October 16, 2008).","key":"key2022031820214436100_b19"},{"unstructured":"Laudon, C.K. and Traver, C. (2002), E\u2010commerce: Business, Technology, Society, Pearson Education, New Delhi, p. 800.","key":"key2022031820214436100_b20"},{"doi-asserted-by":"crossref","unstructured":"Lee, T.O., Yip, Y.L., Tsang, C.M. and Ng, K.W. (2001), \u201cAn agent\u2010based micropayment system for e\u2010commerce\u201d, in Liu, J. and Ye, Y. (Eds), E\u2010commerce Agents. Lecture Notes in Artificial Intelligence, Vol. 2033, Springer, Berlin, pp. 247\u201063.","key":"key2022031820214436100_b21","DOI":"10.1007\/3-540-45370-9_15"},{"unstructured":"Li, X., Lu, J., Cao, C., Feng, Y.X. and Tao, X.P. (2001), \u201cResearch on the security of mobile agent\u2010based system\u201d, Journal of Software, Vol. 13 No. 10, pp. 1991\u20102000.","key":"key2022031820214436100_b22"},{"unstructured":"McKemmish, R. (1999), \u201cTrends and issues in crime and criminal justice\u201d, Australian Institute of Criminology, Vol. 118, pp. 37\u201047.","key":"key2022031820214436100_b24"},{"doi-asserted-by":"crossref","unstructured":"Mahmoud, Q.H. and Yu, L. (2006), \u201cMaking software agents user\u2010friendly\u201d, Computer, Vol. 39 No. 7, pp. 94\u20105, 96.","key":"key2022031820214436100_b23","DOI":"10.1109\/MC.2006.239"},{"doi-asserted-by":"crossref","unstructured":"Medvinsky, G. and Neuman, B.C. (1993), \u201cNetcash: a design for practical electronic currency on the internet\u201d, ACM SIGSAC, November pp. 1026\u2010106.","key":"key2022031820214436100_b25","DOI":"10.1145\/168588.168601"},{"doi-asserted-by":"crossref","unstructured":"Patel, A. (2010), \u201cConcept of mobile agent\u2010based electronic marketplace \u2013 safety measure\u201d, in I\u2010Lee (Ed.), Encyclopedia of E\u2010business Development and Management in the Digital Economy, Business Science Reference, Vol. 1, IGI Global, Hershey, PA, pp. 252\u201064.","key":"key2022031820214436100_b26","DOI":"10.4018\/978-1-61520-611-7.ch025"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A. and Adleman, L. (1978), \u201cA method for obtaining digital signatures and public\u2010key cryptosystems\u201d, Communications of the ACM, Vol. 21 No. 2, pp. 120\u20106.","key":"key2022031820214436100_b27","DOI":"10.1145\/359340.359342"},{"unstructured":"Song, R. and Korba, L. (2003), \u201cSecurity communication architecture for mobile agents and e\u2010commerce\u201d, Proceedings of the 2003 International Work shop on Mobile Systems, E\u2010Commerce and Agent Technology (MSEAT'2003), Miami, FL.","key":"key2022031820214436100_b28"},{"doi-asserted-by":"crossref","unstructured":"Vicka, C., Charles, P., Sybil, S., Greenbergichael, S. and Van, B.J. (2002), \u201cNetwork forensics analysis\u201d, IEEE Computer Society, Vol. 6 No. 6, pp. 60\u20106.","key":"key2022031820214436100_b29","DOI":"10.1109\/MIC.2002.1067738"},{"unstructured":"Wang, D.G., Li, T. and Liu, S. (2007), \u201cDynamic network forensics based on immune agent\u201d, Journal of Wuhan University: Natural Science Edition, Vol. 52 No. 5, pp. 527\u201031.","key":"key2022031820214436100_b30"},{"unstructured":"Wang, R.Y., Liang, L. and Liu, W.F. (2004), \u201cResearch of mobile agent\u2010based security in the e\u2010commerce\u201d, Journal of Application Research of Computers, Vol. 11 No. 8, pp. 137\u20108.","key":"key2022031820214436100_b31"},{"unstructured":"Wang, Y.Q. (2006), \u201cComputer forensics technology of criminal activities in communication networks\u201d, Journal of Telecommunications Science, Vol. 22 No. 6, pp. 63\u20106.","key":"key2022031820214436100_b33"},{"unstructured":"Wen, T., Wang, J.Y. and Liu, J.R. (2004), \u201cA model and its protocols of distributed electronic bank based on mobile agent\u201d, Journal of Mini\u2010micro Systems, Vol. 24 No. 3, pp. 331\u20105.","key":"key2022031820214436100_b34"},{"unstructured":"Yu, B. and Li, X. (2006), \u201cMobile agent\u2010based encryption transmission system\u201d, National Computer System Software Annual Meeting, Washington, DC, pp. 24\u201034.","key":"key2022031820214436100_b35"},{"unstructured":"Zhang, D.L. and Lin, C. (2005), \u201cSecurity model of mobile agent in e\u2010commerce\u201d, China Academic Journal Electronic Publishing House, Vol. 25 No. 6, pp. 1271\u20103.","key":"key2022031820214436100_b37"},{"unstructured":"Zhao, S.H., Xin, F.Q. and Ma, J.Z. (2007), \u201cResearch on secure mobile agent\u2010based electronic commerce\u201d, Journal of Science and Technology Information, Vol. 2, pp. 10\u201011.","key":"key2022031820214436100_b38"},{"unstructured":"Zhou, K.J. (2007), \u201cMobile agent\u2010based cooperative e\u2010commerce security authentication mechanism\u201d, Journal of Computer Engineering, Vol. 33 No. 9, pp. 171\u20103.","key":"key2022031820214436100_b36"},{"unstructured":"Anderson, M.M. (1998), \u201cElectronic cheque architecture\u201d, Financial Services Technology Consortium, Tech. Rep. Version 1.0.2, Financial Services Technology Consortium, Santa Rosa, CA.","key":"key2022031820214436100_frd1"},{"unstructured":"Brands, S. (1993), \u201cAn efficient off\u2010line electronic cash system based on the representation problem\u201d, Technical Report CS\u2010R9323, CWI, Amsterdam.","key":"key2022031820214436100_frd2"},{"unstructured":"Jailani, N., Ahmed, P., Muriati, M., Salha, A. and Yazrina, Y. (2010), \u201cConcept of mobile agent\u2010based electronic marketplace\u201d, in I\u2010Lee (Ed.), Encyclopedia of E\u2010business Development and Management in the Digital Economy, Business Science Reference, IGI Global, Hershey, PA.","key":"key2022031820214436100_frd3"},{"unstructured":"Wang, Y., Wang, Z.Q. and Wei, L.F. (2007), \u201cA migration mechanism of mobile agent system supporting security and fault\u2010tolerance\u201d, Journal of Computer Technology and Development, Vol. 17 No. 3, pp. 169\u201075.","key":"key2022031820214436100_frd4"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685221011064681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221011064681\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221011064681\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:12Z","timestamp":1753402152000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/18\/3\/144-161\/185838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,20]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,7,20]]}},"alternative-id":["10.1108\/09685221011064681"],"URL":"https:\/\/doi.org\/10.1108\/09685221011064681","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2010,7,20]]}}}