2007
DOI: 10.1017/s0269888907001014
|View full text |Cite
|
Sign up to set email alerts
|

On agent technology for e-commerce: trust, security and legal issues

Abstract: The vision of future electronic marketplaces (e-markets) is that of markets being populated by autonomous intelligent entities—software, trading, e-agents—representing their users or owners and conducting business on their behalf. For this vision to materialize, one fundamental issue that needs to be addressed is that of trust. First, users need to be able to trust that the agents will do what they say they do. Second, they need to be confident that their privacy is protected and that the security risks involv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(41 citation statements)
references
References 42 publications
0
35
0
Order By: Relevance
“…Trp involves many periods related to the manipulation performed, which are listed in Table 1 Since the migration of the permission agent is performed internally without any network configuration or charges, and also because this agent carries a small amount of information, we can neglect the time cost dedicated for this operation. Thus, the Equation (1) (2) In order to prove the efficiency of our approach regarding large and complex conditions, we have conducted an experiment to show the scalability of our approach face to three situations:  Situation A: when multiple subjects are requesting different roles and different permissions;  Situation B: when multiple subjects are requesting the same role with different permissions;  Situation C: when multiple subjects are requesting the same role and the same permission; Figure 10 illustrates the results of this experiment, which clearly attests of the scalability of our approach, in terms of time performance, face to the increase of subjects under the three mentioned situations.…”
Section: Time Performancementioning
confidence: 99%
“…Trp involves many periods related to the manipulation performed, which are listed in Table 1 Since the migration of the permission agent is performed internally without any network configuration or charges, and also because this agent carries a small amount of information, we can neglect the time cost dedicated for this operation. Thus, the Equation (1) (2) In order to prove the efficiency of our approach regarding large and complex conditions, we have conducted an experiment to show the scalability of our approach face to three situations:  Situation A: when multiple subjects are requesting different roles and different permissions;  Situation B: when multiple subjects are requesting the same role with different permissions;  Situation C: when multiple subjects are requesting the same role and the same permission; Figure 10 illustrates the results of this experiment, which clearly attests of the scalability of our approach, in terms of time performance, face to the increase of subjects under the three mentioned situations.…”
Section: Time Performancementioning
confidence: 99%
“…• Agent communication (Fasli, 2007). Existing software agents need to share a common terminology in order to facilitate the data interchange between them.…”
Section: Martinez-gil and Aldana-montesmentioning
confidence: 99%
“…Agent-mediated electronic commerce refers to electronic commerce in which agent technologies are applied to provide personalized, continuously running, semi-autonomous behavior. In agent-mediated electronic commerce applications security, privacy, trust, and reputation play a crucial role [24].…”
Section: Application Scenariomentioning
confidence: 99%
“…Anonymity is characterized by the fact that an agent can interact with other parties in a form that these other parties do not know the identity of the agent [24]. For instance, Korba et al [29] presents an anonymous agent communication mechanism based on the Tor network [30].…”
Section: Related Workmentioning
confidence: 99%