Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Security Aspects on Inter-organizational Cooperation Using Wrapper Agents

  • Conference paper
Agent-Based Technologies and Applications for Enterprise Interoperability (ATOP 2005, ATOP 2008)

Abstract

The significance of electronic information exchange in inter-organizational cooperation is well-known. We will here focus on the particular requirements of SMEs. We describe a general wrapper agent solution based on open source freeware that makes it possible (in principle) for any business system to exchange information with any other business system. It has been successfully applied in a pilot study involving two companies in a transport chain using different business systems. We also suggest further improvements by addressing security issues as well as an extended, possibly dynamic, set of involved companies and higher levels of cooperation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anderson, R.: Security Engineering—A Guide to Building Dependable Distributed Systems. John Wiley & Sons, NewYork (2001)

    Google Scholar 

  2. Biztalk home page (2009), http://www.microsoft.com/biztalk/

  3. Bures, T., Plasil, F.: Communication style driven connector configurations. In: Ramamoorthy, C.V., Lee, R., Lee, K.W. (eds.) SERA 2003. LNCS, vol. 3026, pp. 102–116. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Davidsson, P., Ramstedt, L., Törnquist, J.: Interoperability in transport chains using adapters based on open source freeware. In: Interoperability of Enterprise Software and Applications. Springer, Heidelberg (2005)

    Google Scholar 

  5. Ecolead home page (2009), http://ecolead.vtt.fi/

  6. Integrated production and transportation planning within the food industry home page (2009), http://www.ipd.bth.se/fatplan/

  7. Gamma, E., Helm, R., Johnsson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1994)

    Google Scholar 

  8. Hogia mobilast home page (2009), http://www2.hogia.se/website3/1.0.3.0/64/1/index.php

  9. Kolp, M., Do, T.T., Faulkner, S.: Introspecting agent-oriented design patterns. In: Chang, S.K. (ed.) Advances in Software Engineering and Knowledge Engineering, vol. III. World Publishing (2004)

    Google Scholar 

  10. Movex project home page (2009), http://www.lawson.com/wcw.nsf/pub/App_E76358

  11. Persson, R.S.: Information Security Risk Analysis. CRC Press, Boca Raton (2001)

    Google Scholar 

  12. Petrie, C.J., Bussler, C.: Service agents and virtual enterprises: A survey. IEEE Internet Computing 7(4), 68–78 (2003)

    Article  Google Scholar 

  13. Shapiro, C., Varian, H.R.: Information Rules: A Strategic Guide to the Network Economy. HBS Press, Boston (1999)

    Google Scholar 

  14. Shibboleth home page (2009), http://shibboleth.internet2.edu/

  15. Smith, R.: Authentication: From Password to Public Keys. Addison Wesley Professional, Boston (2002)

    Google Scholar 

  16. Trustcom home page (2009), http://www.eu-trustcom.com

  17. Zimmermann, R., Butscher, R., Bodendorf, F.: An ontology for agent-based supply chain monitoring, ECAI 2002 workshop. In: Agent Technologies in Logistics, France (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Carlsson, B., Davidsson, P., Jacobsson, A., Johansson, S.J., Persson, J.A. (2009). Security Aspects on Inter-organizational Cooperation Using Wrapper Agents. In: Fischer, K., Müller, J.P., Odell, J., Berre, A.J. (eds) Agent-Based Technologies and Applications for Enterprise Interoperability. ATOP ATOP 2005 2008. Lecture Notes in Business Information Processing, vol 25. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01668-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01668-4_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01667-7

  • Online ISBN: 978-3-642-01668-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics