{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:17Z","timestamp":1754157677567,"version":"3.41.2"},"reference-count":40,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2011,11,22]],"date-time":"2011-11-22T00:00:00Z","timestamp":1321920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11,22]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Mobile agent\u2010based e\u2010marketplace is one type of business application that has been developed as a flexible and efficient approach to help companies or corporations to extend their businesses to outreach larger markets without regional and continental boundaries. However, every distributed system is unable to avoid the security problems due to the open internet environment. Mobile agent\u2010based e\u2010marketplaces are no exception. Thus, the security of mobile agents is a crucial factor in the design of mobile agent\u2010based e\u2010marketplaces. To overcome this kind of problem, the purpose of this paper is to design and implement a framework and system of secure and trustworthy mobile agent based e\u2010marketplace.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>This paper presents the system design for the system implementation based on the designed framework. It includes three major aspects: the design issues, system design and development environment and tools for system implementation. The system architecture, use case diagram and use case specifications are presented in the system design section.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The system design is an essential step that is required before a prototype system is implemented. The system is designed based on the described and outlined requirements and evaluation criteria, therefore, to support a secure and trustworthy trading environment. The paper is concluded by discussing and highlighting further research work.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper presents the system design for implementing a secure and trustworthy mobile agent\u2010based e\u2010marketplace system by using the latest version of UML modeling tool and techniques.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685221111188610","type":"journal-article","created":{"date-parts":[[2011,11,26]],"date-time":"2011-11-26T07:07:04Z","timestamp":1322291224000},"page":"333-352","source":"Crossref","is-referenced-by-count":3,"title":["Design of secure and trustworthy mobile agent\u2010based e\u2010marketplace system"],"prefix":"10.1108","volume":"19","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[]},{"given":"Wei","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Taghavi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021120025560400_b41","unstructured":"Ajanta (2003), \u201cThe Ajanta mobile agent system\u201d, Documentation and software. available at: www.cs.umn.edu\/Ajanta\/ (accessed 22 February 2011)."},{"key":"key2022021120025560400_b1","doi-asserted-by":"crossref","unstructured":"Antoniou, G., Leon, S., Stefanos, G. and Paramalli, U. (2008), \u201cPrivacy and forensics investigation process: the ERPINA protocol\u201d, Journal of Computer Science and Interface, Vol. 30 No. 4, pp. 229\u201036.","DOI":"10.1016\/j.csi.2007.10.008"},{"key":"key2022021120025560400_b2","doi-asserted-by":"crossref","unstructured":"Au, R., Vasanta, H., Choo, K.R. and Looi, M. (2004), \u201cA user\u2010centric anonymous authorisation framework in e\u2010commerce environment in Janssen\u201d, in Sol, M.H.J. and Wangenaar, R.W. (Eds), sixth International Conference in Electronic Commerce, pp. 138\u201047.","DOI":"10.1145\/1052220.1052238"},{"key":"key2022021120025560400_b3","unstructured":"Bidgoli, H. (2010), The Handbook of Technology Management, Supply Chain Management, Marketing and Advertising, and Global Management, Vol. 2, Wiley, New York, NY, 931 pp."},{"key":"key2022021120025560400_b5","doi-asserted-by":"crossref","unstructured":"Cerezo, A.I., Lopez, J. and Patel, A. (2007), \u201cInternational cooperation to fight transnational cybercrime\u201d, Second International Workshop on Digital Forensics and Incident Analysis (WDFIA), pp. 13\u201027.","DOI":"10.1109\/WDFIA.2007.4299369"},{"key":"key2022021120025560400_b4","unstructured":"Change Vision Inc. (2009), JUDE\/Professional \u2013 Design & Modeling UML, ERD, DFD, Flowchart, CRUD, Mind Map, available at: http:\/\/jude.change\u2010vision.com\/jude\u2010web\/index.html (accessed 5 March 2009)."},{"key":"key2022021120025560400_b6","unstructured":"Drew, G.N. (1999), Using SET for Secure Electronic Commerce, Prentice\u2010Hall, Upper Saddle River, NJ, pp. 265."},{"key":"key2022021120025560400_b7","unstructured":"Eclipse.Org (2010), Eclipse Documentation \u2013 Current Release. Eclipse Galileo, available at: http:\/\/help.eclipse.org\/galileo\/index.jsp?topic=\/org.eclipse.platform.doc.isv\/guide\/int_eclipse.htm (accessed 23 November 2008)."},{"key":"key2022021120025560400_b8","doi-asserted-by":"crossref","unstructured":"Fortino, G., Garro, A. and Russo, W. (2008), \u201cAchieving mobile agent systems interoperability through software layering\u201d, Information and Software Technology, Vol. 50 No. 4, pp. 322\u201041.","DOI":"10.1016\/j.infsof.2007.02.016"},{"key":"key2022021120025560400_b9","unstructured":"Fujii, K. (2007), \u201cJcap \u2013 a Java library for capturing and sending network packets\u201d, Release Version 0.7, available at: http:\/\/netresearch.ics.uci.edu\/kfujii\/jpcap\/doc\/index.html (accessed 19 May 2009)."},{"key":"key2022021120025560400_b12","unstructured":"Hunt, J. (2000), The Unified Process for Practitioners: Object\u2010oriented Design, UML and Java, Springer, London."},{"key":"key2022021120025560400_b13","unstructured":"IBM (2004), \u201cIBM aglet workbench\u201d, available at: www.trl.ibm.co.jp\/aglets\/ (accessed 12 August 2008)."},{"key":"key2022021120025560400_b14","unstructured":"IKV++ GmbH (2003), \u201cGrasshopper mobile agent system: documentation and software\u201d, available at: www.grasshopper.de\/ (accessed 19 April 2009)."},{"key":"key2022021120025560400_b10","doi-asserted-by":"crossref","unstructured":"Jailani, N., Yatim, N.F.M., Yahya, Y., Patel, A. and Othman, M. (2008), \u201cSecure and auditable agent\u2010based e\u2010marketplace framework for mobile users\u201d, Journal of Computer Science & Interface, Vol. 30 No. 4, pp. 237\u201052.","DOI":"10.1016\/j.csi.2007.10.009"},{"key":"key2022021120025560400_b11","unstructured":"Jha, R. (2002), \u201cMobile agent for e\u2010commerce\u201d, Master thesis, KR School of Information Technology, Indian Institute of Technology, Bombay, available at: www.it.iitb.ac.in\/\u223csri\/students\/rahul\u2010thesis.pdf (accessed 23 April 2009)."},{"key":"key2022021120025560400_b15","doi-asserted-by":"crossref","unstructured":"Katos, V. and Patel, A. (2008), \u201cA partial equilibrium view on security and privacy\u201d, Information Management & Computer Security, Vol. 16 No. 1, pp. 74\u201083.","DOI":"10.1108\/09685220810862760"},{"key":"key2022021120025560400_b16","unstructured":"Krzyzanowski, P. (2000), Process Synchronization and Election Algorithms, Lectures Note on Distributed Systems, available at: www.cs.rutgers.edu\/\u223cpxk\/rutgers\/notes\/content\/06\u2010mutex.pdf (accessed 31 December 2010)."},{"key":"key2022021120025560400_b17","unstructured":"Liu, D.S. (2003), \u201cResearch of the two electronic commerce payment protocols: SSL and SET\u201d, Security and Safety Magzine, Vol. 4, pp. 61\u20103."},{"key":"key2022021120025560400_b18","unstructured":"Liu, J.Y., Gu, L.Z., Luo, S.S. and Yang, Y.X. (2010), \u201cAn anonymous authentication scheme for mobile communication\u201d, IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, 25\u201027 June, pp. 359\u201064."},{"key":"key2022021120025560400_b39","doi-asserted-by":"crossref","unstructured":"Medvidovic, N., Rosenblum, D.S., Redmiles, D.F. and Robbins, J.E. (2002), \u201cModeling software architectures in the unified modeling language\u201d, ACM Transactions on Software Engineering and Methodology, Vol. 11 No. 1, pp. 2\u201057.","DOI":"10.1145\/504087.504088"},{"key":"key2022021120025560400_b40","unstructured":"Mishra, S. (1997), \u201cVisual modeling & unified modeling language (UML): introduction to UML\u201d, Rational Software Corporation. available at: www2.informatik.hu\u2010berlin.de\/\u223chs\/Lehre\/2004\u2010WS_SWQS\/20050107_Ex_UML.ppt (accessed 22 February 2011)."},{"key":"key2022021120025560400_b20","unstructured":"ObjectSapce Inc. (2003), \u201cVoyager: documentation and software\u201d, available at: www.recursionsw.com\/products\/voyager (accessed 2 April 2009)."},{"key":"key2022021120025560400_b19","unstructured":"OMG (1997), Introduction to OMG's Unifiied Modeling Language\u2122 (UML\u00ae), Object Management Group, Inc., available at: www.omg.org\/gettingstarted\/what_is_uml.htm (accessed 5 May 2009)."},{"key":"key2022021120025560400_b21","doi-asserted-by":"crossref","unstructured":"Ou, C.M. and Ou, C.R. (2010), \u201cSETNR\/A: an agent\u2010based secure payment protocol for mobile commerce\u201d, International Journal of Intelligent Information and Database Systems, Vol. 4 No. 3, pp. 212\u201026.","DOI":"10.1504\/IJIIDS.2010.034080"},{"key":"key2022021120025560400_b22","unstructured":"Patel, A. (2005), \u201cAn automatic computing approach to developing secure, trusted and auditable services for e\u2010business\u201d, International Journal of Computer Systems Science & Engineering, Vol. 20 No. 6, pp. 433\u20107."},{"key":"key2022021120025560400_b23","doi-asserted-by":"crossref","unstructured":"Patel, A. (2010), \u201cConcept of mobile agent\u2010based electronic marketplace \u2013 safety measure\u201d, in Lee, I. (Ed.), Encyclopedia of E\u2010Business Development and Management in the Digital Economy, IGI Global, Hershey, PA, pp. 252\u201064.","DOI":"10.4018\/978-1-61520-611-7.ch025"},{"key":"key2022021120025560400_b24","doi-asserted-by":"crossref","unstructured":"Patel, A., Qi, W. and Wills, C. (2010), \u201cA review and future research directions of secure and trustworthy mobile agent\u2010based e\u2010marketplace systems\u201d, Information Management & Computer Security, Vol. 18 No. 3.","DOI":"10.1108\/09685221011064681"},{"key":"key2022021120025560400_b25","doi-asserted-by":"crossref","unstructured":"Poggi, A., Tomaiuolo, M. and Vitaglione, G. (2003), \u201cSecurity and trust in agent\u2010oriented middleware\u201d, in Meersman, R. and Tari, Z. (Eds), Proceedings of the OTM Workshops 2003, Catania, Sicily, Italy, Lecture Notes in Computer Science, Vol. 2889, Springer, Heidelberg, pp. 989\u20101003.","DOI":"10.1007\/978-3-540-39962-9_95"},{"key":"key2022021120025560400_b26","unstructured":"Qi, W. (2011), \u201cDesign and implementation of a framework system architecture for secure and trustworthy mobile agent\u2010based e\u2010marketplace\u201d, Master thesis, Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Malaysia."},{"key":"key2022021120025560400_b27","doi-asserted-by":"crossref","unstructured":"Qi, W. and Patel, A. (2009), \u201cA secure and trustworthy framework for mobile agent\u2010based e\u2010marketplace with digital forensics and security protocols\u201d, International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol. 1 No. 3, pp. 8\u201026.","DOI":"10.4018\/jmcmc.2009070102"},{"key":"key2022021120025560400_b28","unstructured":"Song, R. and Korba, L. (2003), \u201cSecurity communication architecture for mobile agents and e\u2010commerce\u201d, Proceedings of the International Work shop on Mobile Systems, E\u2010Commerce and Agent Technology (MSEAT 2003), Miami, FL, USA."},{"key":"key2022021120025560400_b29","unstructured":"van Blarkom, G.W., Borking, J.J. and Olk, J.G.E. (2003), \u201cPET\u201d, Handbook of Privacy and Privacy\u2010enhancing Technologies (The Case of Intelligent Software Agents), College bescherming persoonsgegevens, The Hague, 372 pp."},{"key":"key2022021120025560400_b30","doi-asserted-by":"crossref","unstructured":"Venkatesan, S., Chellappan, C., Vengattaraman, T., Dhavachelva, P. and Vaish, A. (2010), \u201cAdvanced mobile agent security models for code integrity and malicious availability check\u201d, Journal of Network and Computer Application, Vol. 33 No. 6, pp. 661\u201071.","DOI":"10.1016\/j.jnca.2010.03.010"},{"key":"key2022021120025560400_b31","unstructured":"Wang, Y., Wang, Z.Q. and Wei, L.F. (2007), \u201cA migration mechanism of mobile agent system supporting security and fault\u2010tolerance\u201d, Computer Technology and Development, Vol. 17 No. 3, pp. 169\u201075."},{"key":"key2022021120025560400_b38","doi-asserted-by":"crossref","unstructured":"Warnier, M., Oey, M.A., Timmer, R.J., Overeinder, B.J. and Brazier, F.M.T. (2009), \u201cEnforcing integrity of agent migration paths by distribution of trust\u201d, International Journal of Intelligent Information and Database Systems, Vol. 3 No. 4, pp. 382\u201096.","DOI":"10.1504\/IJIIDS.2009.030436"},{"key":"key2022021120025560400_b33","unstructured":"W3.Org (2003), Extensible Markup Language (XML), available at: www.w3.org\/XML\/ (accessed 25 May 2009)."},{"key":"key2022021120025560400_b34","unstructured":"Yang, X.F. (2005), \u201cMobile agent computing in electronic business: potentials, designs and challenges\u201d, PhD thesis, School of Information Technology, Griffith University, Gold Coast."},{"key":"key2022021120025560400_b35","unstructured":"Zhang, D.L. and Lin, C. (2005), \u201cSecurity model of mobile agent in e\u2010commerce\u201d, China Academic Journal Electronic Publishing House, Vol. 25 No. 6, pp. 1271\u20103."},{"key":"key2022021120025560400_b36","unstructured":"Zhao, S.H., Xin, F.Q. and Ma, J.Z. (2007), \u201cResearch on secure mobile agent\u2010based electronic commerce\u201d, Journal of Science and Technology Information, Vol. 2, pp. 10\u201011."},{"key":"key2022021120025560400_frd1","unstructured":"Wikipedia.Org (2010), UML Tool, available at: http:\/\/en.wikipedia.org\/wiki\/UML_tool (accessed 12 January 2010)."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685221111188610","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221111188610\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221111188610\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:23Z","timestamp":1753402163000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/19\/5\/333-352\/181748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,22]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,11,22]]}},"alternative-id":["10.1108\/09685221111188610"],"URL":"https:\/\/doi.org\/10.1108\/09685221111188610","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2011,11,22]]}}}