Designing and Testing Negotiation Protocols for Electronic Commerce Applicationspre-established sequencing that has been possibly (and hopefully) validated. In this article, negotiation is exclusively tackled from the angle of protocols as they can be found in electronic commerce applications.
http://reply.papertrans.cn/16/1512/151108/151108_22.png
0302-9743workshops on speci c aspects of agent technology there are also many companies that are exploring its exploitation possibilities. In the light of these developments and in order to foster the transfer of agent technology from research labs to business, the EU has funded a
etwork of exc- lence" dev
https://doi.org/10.1057/9780230244788e residing on untrusted hosts. However, additional protective measures are required in order to prevent Cut & Paste attacks on mobile agents by malicious hosts. One such mechanism is described. The usefulness of the concepts is illustrated by an example application for user profile management in an electronic commerce setting.
Encrypting Java Archives and Its Application to Mobile Agent Securitye residing on untrusted hosts. However, additional protective measures are required in order to prevent Cut & Paste attacks on mobile agents by malicious hosts. One such mechanism is described. The usefulness of the concepts is illustrated by an example application for user profile management in an electronic commerce setting.
Frank Dignum,Carles SierraIncludes supplementary material:
http://reply.papertrans.cn/16/1512/151108/151108_27.png
http://reply.papertrans.cn/16/1512/151108/151108_28.png
https://doi.org/10.1007/3-540-44682-6Agent Coordination; Agent Mediated Business; Agent Mediated Negotiation; Constraint Satisfaction; Electr
http://reply.papertrans.cn/16/1512/151108/151108_30.png