{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:20Z","timestamp":1754157680010,"version":"3.41.2"},"reference-count":31,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>Mobile agent\u2010based e\u2010marketplaces are business applications that have been developed as flexible and efficient approaches to help companies or corporations to extend their businesses to outreach larger markets without regional and continental boundaries. Every distributed system is unable to avoid security problems due to the open internet environment. Mobile agent\u2010based e\u2010marketplaces are no exceptions. The purpose of this paper is to design and implement a framework and system of a secure and trustworthy mobile agent\u2010based e\u2010marketplace to overcome this problem.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors present an analysis and evaluation of a secure and trustworthy mobile agent\u2010based e\u2010marketplace, which was specified and prototyped. The experimental results of the implemented system are used to address the evaluation of the system. The discussion of the solution is also presented.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The evaluation and performance results show that the proposed framework and system have the ability to provide a secure and efficient e\u2010marketplace environment for trading products. The authors draw conclusions and highlight future work on this specific research area.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The performance and scalability are the two most important issues for mobile\u2010agent based systems together with their feasibility. The evaluation and performance results are used to reflect the results of the research in its entirety.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685221211235634","type":"journal-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T09:09:25Z","timestamp":1390554565000},"page":"123-146","source":"Crossref","is-referenced-by-count":0,"title":["An evaluation of a secure and trustworthy mobile agent\u2010based e\u2010marketplace system"],"prefix":"10.1108","volume":"20","author":[{"given":"Ahmed","family":"Patel","sequence":"first","affiliation":[]},{"given":"Wei","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Mona","family":"Taghavi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012620005157200_b1","doi-asserted-by":"crossref","unstructured":"Alfalayleh, M. and Brankovic, L. (2004), \u201cAn overview of security issues and techniques in mobile agents\u201d, Proceedings of the Eighth IFIP TC\u20106 TC\u201011 Conference on Communications and Multimedia Security (CMS2004), Vol. 175, pp. 59\u201078.","DOI":"10.1007\/0-387-24486-7_5"},{"key":"key2022012620005157200_b2","doi-asserted-by":"crossref","unstructured":"Antoniou, G., Leon, S., Stefanos, G. and Paramalli, U. (2008), \u201cPrivacy and forensics investigation process: the ERPINA protocol\u201d, Journal of Computer Science and Interface, Vol. 30 No. 4, pp. 229\u201036.","DOI":"10.1016\/j.csi.2007.10.008"},{"key":"key2022012620005157200_b3","unstructured":"Braun, P. (2003), \u201cThe migration process of mobile agent: implementation, classification, and optimization\u201d, PhD disseration, Computer Science Department, Friedrich\u2010Schiller\u2010University Jena, Jena, available at: www.db\u2010thueringen.de\/servlets\/DocumentServlet?id=1059 (accessed 2 May 2009)."},{"key":"key2022012620005157200_b4","doi-asserted-by":"crossref","unstructured":"Cerezo, A.I., Lopez, J. and Patel, A. (2007), \u201cInternational cooperation to fight transnational cybercrime\u201d, Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007\u2009), pp. 13\u201027.","DOI":"10.1109\/WDFIA.2007.4299369"},{"key":"key2022012620005157200_b5","unstructured":"Drew, G.N. (1999), Using SET for Secure Electronic Commerce, Prentice\u2010Hall, Upper Saddle River, NJ, p. 265."},{"key":"key2022012620005157200_b30","unstructured":"Eclipse (2010), Eclipse documentation \u2013 Current Release. Eclipse Galileo, available at: http:\/\/help.eclipse.org\/galileo\/index.jsp?topic=\/org.eclipse.platform.doc.isv\/guide\/int_eclipse.htm (accessed 20 February 2012)."},{"key":"key2022012620005157200_b6","doi-asserted-by":"crossref","unstructured":"Fortino, G., Garro, A. and Russo, W. (2008), \u201cAchieving mobile agent systems interoperability through software layering\u201d, Information and Software Technology, Vol. 50 No. 4, pp. 322\u201041.","DOI":"10.1016\/j.infsof.2007.02.016"},{"key":"key2022012620005157200_b7","unstructured":"Freier, A.O., Karlton, P. and Kocher, P.C. (1996), The SSL Protocol Version 3.0, available at: http:\/\/home.netscape.com\/eng\/ssl3\/ssl\u2010toc.html (accessed 27 August 2008)."},{"key":"key2022012620005157200_b31","unstructured":"IBM (2004), \u201cAglet workbench\u201d, available at: www.trl.ibm.co.jp\/aglets\/ (accessed 20 February 2012)."},{"key":"key2022012620005157200_b8","doi-asserted-by":"crossref","unstructured":"Jailani, N., Yatim, N.F.M., Yahya, Y., Patel, A. and Othman, M. (2008), \u201cSecure and auditable agent\u2010based e\u2010marketplace framework for mobile users\u201d, Journal of Computer Science & Interface, Vol. 30 No. 4, pp. 237\u201052.","DOI":"10.1016\/j.csi.2007.10.009"},{"key":"key2022012620005157200_b9","unstructured":"Jha, R. (2002), \u201cMobile agent for e\u2010commerce\u201d, Master thesis, KR School of Information Technology, Indian Institute of Technology, Bombay, available at: www.it.iitb.ac.in\/\u223csri\/students\/rahul\u2010thesis.pdf (accessed 23 April 2009)."},{"key":"key2022012620005157200_b10","unstructured":"Kannammal, A. and Iyengar, N.Ch.S.N. (2007), \u201cA model for mobile agent security in e\u2010business applications\u201d, International Journal of Business and Information, Vol. 2 No. 2, pp. 185\u201098."},{"key":"key2022012620005157200_b11","doi-asserted-by":"crossref","unstructured":"Katos, V. and Patel, A. (2008), \u201cA partial equilibrium view on security and privacy\u201d, Information Management & Computer Security, Vol. 16 No. 1, pp. 74\u201083.","DOI":"10.1108\/09685220810862760"},{"key":"key2022012620005157200_b12","unstructured":"Liu, D.S. (2003), \u201cResearch of the two electronic commerce payment protocols: SSL and SET\u201d, Security and Safety Magzine, Vol. 4, pp. 61\u20103."},{"key":"key2022012620005157200_b13","doi-asserted-by":"crossref","unstructured":"Mahmoud, Q.H. and Yu, L. (2006), \u201cMaking software agents user\u2010friendly\u201d, Computer, Vol. 39 No. 7, pp. 94\u20106.","DOI":"10.1109\/MC.2006.239"},{"key":"key2022012620005157200_b14","doi-asserted-by":"crossref","unstructured":"Panayionou, C., Samaras, G., Pitoura, E. and Evripidou, P. (1999), \u201cParallel computing using Java mobile agents\u201d, Proceedings of 25th EUROMICRO Conference, Milan, Italy, 8\u201010 September, Vol. 2, pp. 430\u20107.","DOI":"10.1109\/EURMIC.1999.794810"},{"key":"key2022012620005157200_b15","unstructured":"Patel, A. (2005), \u201cAn automatic computing approach to developing secure, trusted and auditable services for e\u2010business\u201d, International Journal of Computer Systems Science & Engineering, Vol. 20 No. 6, pp. 433\u20107."},{"key":"key2022012620005157200_b16","doi-asserted-by":"crossref","unstructured":"Patel, A. (2010), \u201cConcept of mobile agent\u2010based electronic marketplace \u2013 safety measure\u201d, in Lee, I. (Ed.), Encyclopedia of E\u2010Business Development and Management in the Digital Economy, IGI Global publications, Western Illinois University, Macomb, IL, pp. 252\u201064.","DOI":"10.4018\/978-1-61520-611-7.ch025"},{"key":"key2022012620005157200_b18","doi-asserted-by":"crossref","unstructured":"Patel, A., Qi, W. and Taghavi, M. (2011), \u201cDesign of secure and trustworthy mobile agent\u2010based e\u2010marketplace system\u201d, Information Management & Computer Security, Vol. 19 No. 5, pp. 333\u201052.","DOI":"10.1108\/09685221111188610"},{"key":"key2022012620005157200_b17","doi-asserted-by":"crossref","unstructured":"Patel, A., Qi, W. and Wills, C. (2010), \u201cA review and future research directions of secure and trustworthy mobile agent\u2010based e\u2010marketplace systems\u201d, Information Management & Computer Security, Vol. 18 No. 3, pp. 144\u201061.","DOI":"10.1108\/09685221011064681"},{"key":"key2022012620005157200_b19","doi-asserted-by":"crossref","unstructured":"Poggi, A., Tomaiuolo, M. and Vitaglione, G. (2003), \u201cSecurity and trust in agent\u2010oriented middleware\u201d, in Meersman, R. and Tari, Z. (Eds), OTM Workshops 2003, Vol. 2889, Springer, New York, NY, pp. 989\u20101003.","DOI":"10.1007\/978-3-540-39962-9_95"},{"key":"key2022012620005157200_b20","unstructured":"Qi, W. (2011), \u201cDesign and implementation of a framework system architecture for secure and trustworthy mobile agent\u2010based e\u2010marketplace\u201d, Master thesis, Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi."},{"key":"key2022012620005157200_b21","doi-asserted-by":"crossref","unstructured":"Qi, W. and Patel, A. (2009), \u201cA secure and trustworthy framework for mobile agent\u2010based e\u2010marketplace with digital forensics and security protocols\u201d, International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol. 1 No. 3, pp. 8\u201026.","DOI":"10.4018\/jmcmc.2009070102"},{"key":"key2022012620005157200_b22","doi-asserted-by":"crossref","unstructured":"Rodrigo, T.D. and Stanski, A. (2000), \u201cThe evolving future of agent\u2010based electronic commerce\u201d, in Rahman, S.M. and Raisinghani, M.S. (Eds), Electronic Commerce: Opportunity and Challenges, Idea Group Publishing, Hershey, PA, pp. 337\u201051.","DOI":"10.4018\/978-1-878289-76-6.ch021"},{"key":"key2022012620005157200_b23","unstructured":"Smith, C.U. and Williams, L.G. (2002), Performance Solutions: A Practical Guide to Creating Responsive, Scalable Software, Addison\u2010Wesley, Boston, MA."},{"key":"key2022012620005157200_b24","unstructured":"Song, R. and Korba, L. (2003), \u201cSecurity communication architecture for mobile agents and e\u2010commerce\u201d, Proceedings of the 2003 International Work shop on Mobile Systems, E\u2010Commerce and Agent Technology (MSEAT'2003), Miami, Florida, USA."},{"key":"key2022012620005157200_b25","unstructured":"Spyrou, C., Samaras, E. and Evripidou, P. (1999), \u201cSoftware models for wireless and mobile computing: survey and case study\u201d, Technical Report TR\u201099\u20105, University of Cyprus, Nicosia."},{"key":"key2022012620005157200_b26","unstructured":"Tursem, M.E., Gune\u015f, M.H., Yildiz, M. and Kuru, S. (2003), \u201cPerformance analysis of mobile agents using simulation\u201d, Proceedings of the Advanced Engineering Design Conference (AED2003), Prague, Czech Republic."},{"key":"key2022012620005157200_b27","unstructured":"Yang, X.F. (2005), \u201cMobile agent computing in electronic business: potentials, designs and challenges\u201d, PhD thesis, School of Information Technology, Griffith University, Gold Coast."},{"key":"key2022012620005157200_b28","unstructured":"Zhang, D.L. and Lin, C. (2005), \u201cSecurity model of mobile agent in e\u2010commerce\u201d, China Academic Journal Electronic Publishing House, Vol. 25 No. 6, pp. 1271\u20103."},{"key":"key2022012620005157200_b29","unstructured":"Zhao, S.H., Xin, F.Q. and Ma, J.Z. (2007), \u201cResearch on secure mobile agent\u2010based electronic commerce\u201d, Journal of Science and Technology Information, Vol. 2, pp. 10\u201011."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685221211235634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221211235634\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685221211235634\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:24Z","timestamp":1753402164000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/20\/2\/123-146\/179738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,1]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,6,1]]}},"alternative-id":["10.1108\/09685221211235634"],"URL":"https:\/\/doi.org\/10.1108\/09685221211235634","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2012,6,1]]}}}