{"id":"https://openalex.org/W1964246709","doi":"https://doi.org/10.1108/09685221011064681","title":"A review and future research directions of secure and trustworthy mobile agent\u2010based e\u2010marketplace systems","display_name":"A review and future research directions of secure and trustworthy mobile agent\u2010based e\u2010marketplace systems","publication_year":2010,"publication_date":"2010-07-11","ids":{"openalex":"https://openalex.org/W1964246709","doi":"https://doi.org/10.1108/09685221011064681","mag":"1964246709"},"language":"en","primary_location":{"id":"doi:10.1108/09685221011064681","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221011064681","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113723340","display_name":"Ahmed Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I205051169","display_name":"Kingston University","ror":"https://ror.org/05bbqza97","country_code":"GB","type":"education","lineage":["https://openalex.org/I205051169"]},{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["GB","MY"],"is_corresponding":true,"raw_author_name":"Ahmed Patel","raw_affiliation_strings":["Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames, UK","(Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames, UK)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames, UK","institution_ids":["https://openalex.org/I885383172","https://openalex.org/I205051169"]},{"raw_affiliation_string":"(Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames, UK)","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110487285","display_name":"Wei Qi","orcid":"https://orcid.org/0009-0002-5834-3666"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Wei Qi","raw_affiliation_strings":["Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","Universiti Kebangsaan Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]},{"raw_affiliation_string":"Universiti Kebangsaan Malaysia","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005792322","display_name":"Christopher Wills","orcid":"https://orcid.org/0000-0003-4800-8979"},"institutions":[{"id":"https://openalex.org/I205051169","display_name":"Kingston University","ror":"https://ror.org/05bbqza97","country_code":"GB","type":"education","lineage":["https://openalex.org/I205051169"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Christopher Wills","raw_affiliation_strings":["Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames, UK","[Kingston University]"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing Information Systems and Mathematics, Kingston University, Kingston upon Thames, UK","institution_ids":["https://openalex.org/I205051169"]},{"raw_affiliation_string":"[Kingston University]","institution_ids":["https://openalex.org/I205051169"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113723340"],"corresponding_institution_ids":["https://openalex.org/I205051169","https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":9.2841,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.97611708,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"18","issue":"3","first_page":"144","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7149049043655396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7012627124786377},{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.44779419898986816},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4461958706378937},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4410938620567322},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17915409803390503}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7149049043655396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7012627124786377},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.44779419898986816},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4461958706378937},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4410938620567322},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17915409803390503},{"id":"https://openalex.org/C121955636","wikidata":"https://www.wikidata.org/wiki/Q4116214","display_name":"Accounting","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/09685221011064681","is_oa":false,"landing_page_url":"https://doi.org/10.1108/09685221011064681","pdf_url":null,"source":{"id":"https://openalex.org/S204075876","display_name":"Information Management & Computer Security","issn_l":"0968-5227","issn":["0968-5227","1758-5805"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Management &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.460.8596","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.460.8596","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://dircweb.kingston.ac.uk/papers/Patel2010_15598580/A Review and Future Research Directions of Secure and Trustworthy Mobile Agent-based_preprint_Vol 18%2C No 3_imcs-09-2009-0035_rtc_cl_final.pdf","raw_type":"text"},{"id":"pmh:oai:eprints.kingston.ac.uk:16475","is_oa":false,"landing_page_url":"http://eprints.kingston.ac.uk/id/eprint/16475/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400991","display_name":"Research Repository (Kingston University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801636071","host_organization_name":"Kingston Hospital NHS Trust","host_organization_lineage":["https://openalex.org/I2801636071"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W23440280","https://openalex.org/W58705524","https://openalex.org/W658992740","https://openalex.org/W1490785521","https://openalex.org/W1548991446","https://openalex.org/W1863517429","https://openalex.org/W1964009902","https://openalex.org/W1996360405","https://openalex.org/W1996833394","https://openalex.org/W2004822040","https://openalex.org/W2005598259","https://openalex.org/W2007199417","https://openalex.org/W2010573219","https://openalex.org/W2011896860","https://openalex.org/W2035860889","https://openalex.org/W2134270170","https://openalex.org/W2156849122","https://openalex.org/W2169038496","https://openalex.org/W2257569754","https://openalex.org/W2352379978","https://openalex.org/W2353451461","https://openalex.org/W2358822920","https://openalex.org/W2361876690","https://openalex.org/W2365884566","https://openalex.org/W2374856731","https://openalex.org/W3021971524","https://openalex.org/W3111835944","https://openalex.org/W3148785688","https://openalex.org/W4232836212","https://openalex.org/W7020985643","https://openalex.org/W7024853833"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Purpose":[0],"There":[1],"is":[2,36,138,166],"a":[3,40,139,194],"need":[4],"to":[5,38,55,125,148,173,182,196],"provide":[6,56],"secure":[7,90,150,187],"and":[8,20,25,28,47,64,68,80,87,91,120,127,144,151,160,168,188,192,204],"safe":[9],"information":[10],"security":[11],"systems":[12,199],"through":[13],"the":[14,75,78,84,100,104,108,121,180,184,201],"use":[15],"of":[16,33,62,89,99,103,142],"firewalls,":[17],"intrusion":[18],"detection":[19],"prevention":[21],"systems,":[22,117,119],"encryption,":[23],"authentication,":[24],"other":[26],"hardware":[27],"software":[29],"solutions.":[30],"The":[31,72,132,156,177],"purpose":[32],"this":[34],"paper":[35,73,157,178],"therefore":[37],"propose":[39],"framework":[41,86,195],"which":[42,165],"includes":[43],"safe,":[44],"secure,":[45],"trusted,":[46],"auditable":[48,126,143],"services,":[49],"as":[50,52,77],"well":[51],"forensic":[53,129,146],"mechanisms":[54],"audit":[57],"trails":[58],"for":[59,83,107,112,186],"digital":[60,128,145],"evidence":[61],"transactions":[63],"protection":[65],"against":[66],"malicious":[67],"illegal":[69],"activities.":[70],"Design/methodology/approach":[71],"reviews":[74],"literature":[76],"foundation":[79],"knowledge":[81,134],"base":[82],"proposed":[85],"system":[88],"trustworthy":[92,152,189],"mobile":[93],"agent":[94],"(MA)\u2010based":[95],"e\u2010marketplaces.":[96],"It":[97],"consists":[98],"current":[101,133],"state":[102],"art":[105],"taxonomy":[106],"classified":[109],"MA\u2010based":[110,153,190],"frameworks":[111],"e\u2010marketplace":[113],"trading,":[114],"underlying":[115],"supporting":[116],"e\u2010payment":[118],"essential":[122],"issues":[123],"related":[124],"services.":[130],"Findings":[131],"shows":[135],"that":[136,171],"there":[137],"serious":[140],"lack":[141],"services":[147],"make":[149],"e\u2010marketplaces":[154,191],"systems.":[155],"draws":[158],"conclusions":[159],"highlights":[161],"further":[162],"research":[163],"work":[164,170],"ongoing":[167],"new":[169],"needs":[172,181],"be":[174],"performed.":[175],"Originality/value":[176],"perceives":[179],"define":[183],"requirements":[185],"proposes":[193],"design":[197],"effective":[198],"using":[200],"latest":[202],"techniques":[203],"technologies.":[205]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
