09/28/2007 CIS Dept., UMass Dartmouth 1 Trustworthy Agent-Based Online Auction Systems Prof. Haiping Xu Concurrent Software Systems Laboratory Computer.

Slides:



Advertisements
Similar presentations
Chapter 3 E-Strategy.
Advertisements

Example policy elements and their role in bandwidth management and optimisation.
E-Auctions. Electronic CommercePrentice Hall © Learning Objectives 1.Define the various types of e-auctions and list their characteristics. 2.Describe.
An Auctioning Reputation System Based on Anomaly Detection Shai Rubin, Mihai Christodorescu Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang,
Shillin’ like a Villian: Fraud in Online Auction Markets HAN YANG LEE AND TOM XU ECON1465, Fall 2011 Brown University.
A Trustworthy Agent Based Online Auction System Rinkesh Patel CIS Master Project – Spring 2006 Advisor: Dr. Haiping Xu.
Chapter 10 E-Auctions.
1 Chapter 6: Auctions SCIT1003 Chapter 6: Auctions Prof. Tsang.
The Science of Networks 6.1 Today’s topics Game Theory Normal-form games Dominating strategies Nash equilibria Acknowledgements Vincent Conitzer, Michael.
Competitive Auctions Review Rattapon Limprasittiporn.
Auction. Definition An auction is a process of buying and selling goods or services by offering them up for bid, taking bids, and then selling the item.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
C SC 421: Artificial Intelligence …or Computational Intelligence Alex Thomo
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
VAMSEE KONERU PRADNYA SUTE
10/09/2006CIS Dept., UMass Dartmouth1 A Petri Net Based XML Firewall Security Model for Web Services Invocation Prof. Haiping Xu Concurrent Software Systems.
Auctioning one item PART 3 Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Auctioning one item PART 2 Tuomas Sandholm Computer Science Department Carnegie Mellon University.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
1 The role of interpersonal information in electronic commerce: The case of Internet auctions The role of interpersonal information in electronic commerce:
EMarket Marketing Presentation Nicholas Woolley Nam Nguyen Jason Webb.
TRAVEL RESERVATION SYSTEM USING WEB SERVICES COMPOSITION LANGUAGE
11/19/2007 CIS Dept., UMass Dartmouth 1 DRBD: Dynamic Reliability Block Diagram for System Reliability Modeling Prof. Haiping Xu Concurrent Software Systems.
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
5/26/2005CIS Dept., UMass Dartmouth1 A Methodology for Role- Based Modeling of Open Multi-Agent Software Systems Prof. Haiping Xu Concurrent Software Systems.
1 Chapter 9 Electronic Commerce and Electronic Business.
and Lecture Notes in Game Theory1 Game Theory Applications: Lecture Notes Course Website u Galina.
Multi-Agent System for Online Auctions Jose Manuel Valladares Pernas CIS Master Project - Fall 2004 Advisor: Dr. Haiping Xu.
Umbrella Corp Practica 9 – English Group E-commerce Resources.
Experimental Auction Study EXPERIMENTAL Sealed-Bid Auction.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Databases Chapter 11.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Security Guidelines and Management
Online Shopping Take Charge of Your Finances
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Introduction to Auctions David M. Pennock. Auctions: yesterday Going once, … going twice,...
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Intelligent Agent By: Kian Yousefi.
So far, we have…
Figures – Chapter 14. Figure 14.1 System layers where security may be compromised.
CIS 600: Master's Project Online Trading and Data Mining- Based Marketing of IT Books Supervisor : Dr. Haiping Xu Student : Tsung-Ta Tu Student ID :
IELM 231: IT for Logistics and Manufacturing Course Agenda Introduction IT applications design: Human-Computer Interface Fundamental IT tools: sorting,
University of Piraeus Department of Technology Education and Digital Systems Centre for Research and Technology - Hellas(C.E.R.T.H.) Informatics and Telematics.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Institutions in The Experimental Economics Framework Chamberlin (1948)- first reported market experiment – unregulated and unstructured trading – outcome.
Tests of Revenue Equivalence in Internet Magic Auctions David Lucking-Reiley “I have never considered the lab to be a substitute for field empirical work.”
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
All About eBay. What do you need to do? Know the basics. Establish an account. Buying strategies Selling strategies Safety precautions.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Dynamic Trading Pertemuan Mata kuliah: M Konsep E-Business Tahun: 2010.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Emil Wibowo, Supervisor: Jenny Liu Cloud-based Architecture for Collaborative Simulation of Auction- based Resource Allocation.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 10 Dynamic Trading: E-Auctions, Bartering, and Negotiations.
Business Intelligence Overview. What is Business Intelligence? Business Intelligence is the processes, technologies, and tools that help us change data.
Computer Security Keeping you and your computer safe in the digital world.
High Performance Computing Lab.
Enterprise Systems Architectures
Introduction to Cloud Computing
The Internet as a Third Party
Introduction to Agents
PDCAT’2000 Panel, Hong Kong ”The Application of PDC (Parallel and Distributed Computing) and Technique in E-Commerce” Rajkumar Buyya School of Computer.
Research Challenges in Enterprise Privacy Authorization Language
Module Description: This course intends to introduce special topics of current trends in information technology. Topics covered in this course should be.
Formalization of Trust, Fraud, and Vulnerability Analysis
Presentation transcript:

09/28/2007 CIS Dept., UMass Dartmouth 1 Trustworthy Agent-Based Online Auction Systems Prof. Haiping Xu Concurrent Software Systems Laboratory Computer and Information Science Department University of Massachusetts Dartmouth

09/28/2007CIS Dept., UMass Dartmouth2 Online Auctions Different types of auctions Increase-price auction (English auction) Decrease-price auction (Dutch auction) Second-price sealed-bid auction (Vickrey auction) English auction has become the most popular one in online auction houses (e.g., eBay). However, it is time-consuming for a human user to search and place bids on an auctioned item. There is a pressing need to introduce agent technology into online auction systems.

09/28/2007CIS Dept., UMass Dartmouth3 Agent-Based Online Auction System Client Auction House (Server) GUI Agent Auction Agent Security Agent Main Agent Search Agent Selling/Bidding Agent Database It consists of an auction house and a number of clients. It is designed as a multi-agent system. The auction house is managed by auction house administrator. Agents at the client side work on behalf of human users. Security agent monitors online auction transactions for any undesired bidding activities, e.g., shilling behaviors.

09/28/2007CIS Dept., UMass Dartmouth4 Shilling Behaviors A shill bidding is a deliberate activity of placing bids in order to artificially raise the price of an auctioned item. Although most of the online auction houses prohibit shilling behaviors, it is easy for malicious users to disguise themselves and put in shill bids in online auctions. According to a recent research at Carnegie Mellon University, dozens of probable fraudsters were detected at eBay using data mining techniques. It is vital for us to introduce a feasible trust management mechanism to prevent, detect and avoid trading frauds, such as shilling behaviors.

09/28/2007CIS Dept., UMass Dartmouth5 An Example We call this type of shilling behavior concurrent shilling. Other types of shilling behaviors include: reserve price shilling, competitive shilling etc. Shilling behaviors become much more server in an agent- based online auction system because Detection of shill bidders can be much more difficult. Malicious users may set up bidding strategies and automatically initiate shilling activities using agent technology. While two auctions with the same type of auctioned items are running concurrently, a shill bidder might put bids in the auction with higher bidding price rather than the one with lower bidding price in order to drive up the price in one auction.

09/28/2007CIS Dept., UMass Dartmouth6 Trust Management Trust and reputation management has been a promising approach to building trustworthiness in networked systems. Two major types of trust management approaches Reputation-based trust management (e.g., in eBay) Policy-based trust management (e.g., R EFEREE, KeyNote). Our approach is a combined approach, which Considers agent reputations stored in a history module. Adopts role-based access control (RBAC) mechanism based on a set of policy rules. More importantly, considers user’s real-time behaviors in agent-based online auctions.

09/28/2007CIS Dept., UMass Dartmouth7 Related Publications H. Xu and Y-T Cheng Model Checking Bidding Behaviors in Internet Concurrent Auctions. International Journal of Computer Systems Science & Engineering (IJCSSE), July 2007, Vol. 22, No. 4, pp R. Patel, H. Xu, and A. Goel Real-Time Trust Management in Agent Based Online Auction Systems. Proceedings of the19th International Conf. on Software Engineering and Knowledge Engineering (SEKE'07), Boston, USA, July 2007, pp Y-T Cheng and H. Xu A Formal Approach to Detecting Shilling Behaviors in Concurrent Online Auctions. Proceedings of the 8th International Conf. on Enterprise Information Systems (ICEIS 2006), May 2006, Paphos, Cyprus, pp Contact Information Haiping Xu, Assistant Professor Computer and Information Science Department University of Massachusetts Dartmouth Phone : (508) Sol M. Shatz, Professor (Collaborator) Computer Science Department University of Illinois at Chicago Phone : (312) This project was supported by the Chancellor’s Research Fund and UMass Joseph P. Healey Endowment Grants, and the U.S. National Science Foundation under grant number CNS