Non-repudiation in electronic commerce:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Artech House
2001
|
Schriftenreihe: | Artech House computer security series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIV, 200 S. |
ISBN: | 1580532470 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV019286706 | ||
003 | DE-604 | ||
005 | 20040728 | ||
007 | t | ||
008 | 040503s2001 |||| 00||| eng d | ||
020 | |a 1580532470 |9 1-58053-247-0 | ||
035 | |a (OCoLC)46732655 | ||
035 | |a (DE-599)BVBBV019286706 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
050 | 0 | |a HF5548.32 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Zhou, Jianying |e Verfasser |4 aut | |
245 | 1 | 0 | |a Non-repudiation in electronic commerce |c Jianying Zhou |
264 | 1 | |a Boston [u.a.] |b Artech House |c 2001 | |
300 | |a XIV, 200 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Artech House computer security series | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Electronic commerce |x Computer network resources | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |C b |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012038717&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-012038717 |
Datensatz im Suchindex
_version_ | 1804131857656184832 |
---|---|
adam_text | Contents
Preface xii[
1 Introduction 1
1.1 Electronic Commerce and Security 1
1.2 Repudiation and Dispute Resolution 4
1.3 Non repudiation and Network Security 6
1.4 Non repudiation in Message Handling Systems 8
1.5 Non repudiation in Electronic Payment Systems 10
1.6 Book Outline 13
References 15
2 Fundamentals of Non repudiation 19
2.1 Goals of Non repudiation 20
2.2 Non repudiation Services 21
2.3 Non repudiation Evidence 23
Non repudiation in Electronic Commerce
2.3.1 Types of Evidence 23
2.3.2 Elements of Evidence 24
2.3.3 Validity of Evidence 25
2.4 Roles of TTPs 26
2.4.1 Certification Authority 27
2.4.2 Notary 29
2.4.3 Delivery Authority 29
2.4.4 Time Stamping Authority 30
2.4.5 Adjudicator 30
2.5 Phases of Non repudiation 31
2.5.1 Evidence Generation 31
2.5.2 Evidence Transfer 32
2.5.3 Evidence Verification and Storage 32
2.5.4 Dispute Resolution 33
2.6 Non repudiation Policy 34
2.7 Requirements for Non repudiation 35
2.7.1 Technical Infrastructure 35
2.7.2 Legal Framework 36
References 37
3 Securing Digital Signatures for Non repudiation 4|
3.1 Security Requirements on Digital Signatures 41
3.1.1 Non repudiation Versus Authentication 42
3.1.2 Device for Signature Generation 43
3.2 Timestamps in Digital Signatures 44
3.2.1 Ordinary Timestamps 44
3.2.2 Trusted Timestamps 45
3.3 Securing TTP s Digital Signatures 45
3.4 Time Stamping Approach 46
Contents ix
3.5 Auditing Approach 47
3.6 One Way Sequential Link Approach 48
3.6.1 Generation of a One Way Sequential Link 48
3.6.2 Termination of a One Way Sequential Link 50
3.6.3 Dispute Resolution 51
3.7 Temporary Certificate Approach 53
3.7.1 Certificate Generation 53
3.7.2 Signature Generation and Verification 54
3.7.3 Protection Against Key Compromise 55
3.7.4 Flexible Expiry Date 56
3.7.5 Dispute Resolution 57
3.7.6 Security Analysis 58
3.8 Comparison 59
3.8.1 Security 59
3.8.2 TTP s Involvement 60
3.8.3 Computation 60
3.8.4 Storage 61
3.9 Summary 62
References 63
4 Achieving Fair Non repudiation 65
4.1 Factors Against Fair Non repudiation 65
4.2 Approaches to Fair Non repudiation 68
4.2.1 Gradual Exchange Approach 69
4.2.2 Third Party Approach 70
4.3 Protocol NR1: Using Lightweight
Online TTP 71
4.3.1 Protocol Description 72
4.3.2 Dispute Resolution 74
4.3.3 Time Information 75
Non repudiation in Electronic Commerce
4.3.4 Message Privacy 77
4.3.5 Evidence Chaining 78
4.4 Protocol NR2: Using Offline TTP Without
Timely Termination 80
4.4.1 Protocol Description 81
4.4.2 Dispute Resolution 82
4.4.3 Limitation 82
4.5 Protocol NR3: Using Offline TTP with
Timely Termination 84
4.5.1 Protocol Description 84
4.5.2 Security Analysis 87
4.6 Protocol NR4: Using Inline TTP for Timely
Delivery 90
4.6.1 Evidence for Timely Message Transfer 90
4.6.2 Protocol Description 91
4.6.3 Dispute Resolution 93
4.7 Summary 94
References 95
5 Related Work on Fair Non repudiation 99
5.1 Protocols Using Inline TTP 99
5.1.1 Coffey Saidha Protocol 99
5.1.2 Bahreman Tygar Protocol 101
5.2 Protocols Using Online TTP 102
5.2.1 Deng Gong Lazar Wang Protocol 102
5.2.2 Cox Tygar Sirbu Protocol 104
5.3 Protocols Using Offline TTP 106
5.3.1 Asokan Schunter Waidner Protocol 106
5.3.2 Bao Deng Mao Protocol 108
5.3.3 Asokan Shoup Waidner Protocol 110
Contents xi
5.4 Protocols with Probabilistic Fairness 114
5.4.1 BenOr Goldreich Micali Rivest Protocol 114
5.4.2 Olivier Yves Protocol 117
5.5 Summary 120
References 122
6 ISO s Non repudiation Mechanisms 125
6.1 Overview of ISO/IEC 13888 126
6.1.1 Part 1: General 126
6.1.2 Part 2: Mechanisms Using Symmetric
Techniques 127
6.1.3 Part 3: Mechanisms Using Asymmetric
Techniques 128
6.2 Mechanisms Using Symmetric Techniques 128
6.2.1 Ml: Mandatory NRO, Optional NRR 129
6.2.2 M2: Mandatory NRO and NRR 131
6.2.3 M3: Mandatory NRO and NRR with
Intermediary TTP 132
6.3 Mechanisms Using Asymmetric Techniques 134
6.4 Time Stamping Evidence 135
6.5 Summary 137
References 137
7 Case Studies 139
7.1 Non repudiation in Electronic Payment 139
7.1.1 Electronic Payment for Internet Lottery 140
7.1.2 Internet Lottery Service Model 142
7.1.3 Ticket Purchase Protocol 145
7.1.4 Winning Number Generation Protocol 148
xii Non repudiation in Electronic Commerce
7.1.5 Prize Claim Protocol 149
7.1.6 Security Analysis 151
7.2 Undeniable Billing in Mobile Communications 154
7.2.1 Security Requirements on Mobile
Communications 155
7.2.2 Billing Model and Initial Assumptions 156
7.2.3 Registration Protocol 158
7.2.4 Service Request Protocol 160
7.2.5 Undeniable Metering on Local Calls 161
7.2.6 Payment and Dispute Resolution 162
7.2.7 Security and Performance Analysis 163
7.2.8 Related Work 166
7.3 Summary 171
References 172
8 Conclusion 175
Appendix Toward Formal Verification of Non repudiation 1!H
A.1 The SVO Logic 182
A.2 Formalization of Non repudiation 185
A.3 Verification of a Non repudiation Protocol 186
A.4 Summary 189
References 190
About the Author 15M
|
any_adam_object | 1 |
author | Zhou, Jianying |
author_facet | Zhou, Jianying |
author_role | aut |
author_sort | Zhou, Jianying |
author_variant | j z jz |
building | Verbundindex |
bvnumber | BV019286706 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.32 |
callnumber-search | HF5548.32 |
callnumber-sort | HF 45548.32 |
callnumber-subject | HF - Commerce |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)46732655 (DE-599)BVBBV019286706 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01633nam a2200433 c 4500</leader><controlfield tag="001">BV019286706</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040728 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">040503s2001 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580532470</subfield><subfield code="9">1-58053-247-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)46732655</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019286706</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.32</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zhou, Jianying</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Non-repudiation in electronic commerce</subfield><subfield code="c">Jianying Zhou</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 200 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computer security series</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Computer network resources</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012038717&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-012038717</subfield></datafield></record></collection> |
id | DE-604.BV019286706 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:43:36Z |
institution | BVB |
isbn | 1580532470 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-012038717 |
oclc_num | 46732655 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XIV, 200 S. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Artech House |
record_format | marc |
series2 | Artech House computer security series |
spelling | Zhou, Jianying Verfasser aut Non-repudiation in electronic commerce Jianying Zhou Boston [u.a.] Artech House 2001 XIV, 200 S. txt rdacontent n rdamedia nc rdacarrier Artech House computer security series Unternehmen Business enterprises Computer networks Security measures Data encryption (Computer science) Electronic commerce Computer network resources Internet Security measures Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 s Computersicherheit (DE-588)4274324-2 s b DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012038717&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Zhou, Jianying Non-repudiation in electronic commerce Unternehmen Business enterprises Computer networks Security measures Data encryption (Computer science) Electronic commerce Computer network resources Internet Security measures Electronic Commerce (DE-588)4592128-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4592128-3 (DE-588)4274324-2 |
title | Non-repudiation in electronic commerce |
title_auth | Non-repudiation in electronic commerce |
title_exact_search | Non-repudiation in electronic commerce |
title_full | Non-repudiation in electronic commerce Jianying Zhou |
title_fullStr | Non-repudiation in electronic commerce Jianying Zhou |
title_full_unstemmed | Non-repudiation in electronic commerce Jianying Zhou |
title_short | Non-repudiation in electronic commerce |
title_sort | non repudiation in electronic commerce |
topic | Unternehmen Business enterprises Computer networks Security measures Data encryption (Computer science) Electronic commerce Computer network resources Internet Security measures Electronic Commerce (DE-588)4592128-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Unternehmen Business enterprises Computer networks Security measures Data encryption (Computer science) Electronic commerce Computer network resources Internet Security measures Electronic Commerce Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012038717&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT zhoujianying nonrepudiationinelectroniccommerce |