منابع مشابه
Secure Mobile Trade Agent
E-commerce on the internet has the ability to produce millions of transactions and a great number of merchants whose supply merchandise over the internet. As a result, it is difficult for entities to roam over every site on the internet and choose the best merchandise to trade. So, in this paper we introduced a mobile trade agent that visit the sites to gather and evaluate the information from ...
متن کاملE-Commerce with Secure Mobile Trade Agent
E-commerce on the Internet has the ability to produce millions of trades at the same time the number of merchants supplying commodities on the Internet is considerable, but it is difficult for individuals to tour every site on the Internet and choose where it is best to trades. In this paper we introduce Mobile Trade Agent (MTA) that rove a network, gather and examine the information from merch...
متن کاملModeling Secure Mobile Agent Systems
We propose a MDA based approach for designing secure mobile agent systems. First, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. Second, we project the application model into AGLETS-specific model, which describes the main functionaliti...
متن کاملE-Commerce with Secure Mobile Trade Agents
E-commerce on the Internet has the ability to produce millions of trades at the same time the number of merchants supplying commodities on the Internet is considerable, but it is difficult for individuals to tour every site on the Internet and choose where it is best to trades. In this paper we introduce Mobile Trade Agent (MTA) that rove a network, gather and examine the information from merch...
متن کاملA Secure Communication in Mobile Agent System
A mobile agent is a software code with mobility which can be move from a computer into another computers through network. The mobile agent paradigm provides many benefits in developments of distributed application at the same time introduce new requirements for security issues with these systems. In this article we present a solution for protection agent from other agents attacks with loging pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science
سال: 2007
ISSN: 1549-3636
DOI: 10.3844/jcssp.2007.329.334