DETECTING PONZI AND PYRAMID BUSINESS SCHEMES IN CHOREOGRAPHED WEB SERVICES

被引:0
作者
Gunestas, Murat [1 ]
Mehmet, Murad [2 ]
Wijesekera, Duminda [2 ]
机构
[1] Gen Directorate Secur, Ankara, Turkey
[2] George Mason Univ, Fairfax, VA USA
来源
ADVANCES IN DIGITAL FORENSICS VI | 2010年 / 337卷
关键词
Web services; choreographies; Ponzi schemes; pyramid schemes;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Businesses are increasingly using web service choreographies to implement dynamic service invocations and content specific operations. These web service choreographies can be misused at multiple levels - by exploiting their technical capabilities and using them to design complex illegal business schemes such as Ponzi, pyramid and money laundering schemes. One of the main problems with the illegal schemes is that they are similar to legal multistage business schemes; their illegality is apparent only to a macroscopic observer. This paper describes some of these schemes and demonstrates how to obtain evidence pertaining to the schemes using cryptographically-secure local message repositories. The evidence gathered is of considerable value to financial fraud investigators, business arbiters, potential investors and judicial actors.
引用
收藏
页码:133 / +
页数:3
相关论文
共 16 条
[1]  
[Anonymous], 2006, LOS ANGELES TIMES
[2]  
Bilal M, 2005, P IEEE I C SERV COMP, P337
[3]  
Gunestas M., 2009, P IEEE INT C SYST SY, P1
[4]  
Gunestas M, 2008, INT FED INFO PROC, V285, P163
[5]  
Herzberg A., 2007, 2007139 CRYPT EPRINT
[6]   The WSLA Framework: Specifying and Monitoring Service Level Agreements for Web Services [J].
Keller, Alexander ;
Ludwig, Heiko .
Journal of Network and Systems Management, 2003, 11 (01) :57-81
[7]   An intensive survey of fair non-repudiation protocols [J].
Kremer, S ;
Markowitch, O ;
Zhou, JY .
COMPUTER COMMUNICATIONS, 2002, 25 (17) :1606-1621
[8]  
Sahai A, 2002, LECT NOTES COMPUT SC, V2506, P28
[9]  
SavvySugar, 2009, MAIN STREET 0623
[10]  
Stewart R., 2009, WALL STREET J