The application of model checking for securing e-commerce transactions

被引:11
作者
Anderson, Bonnie Brinton [1 ]
Hansen, James V.
Lowry, Paul Benjamin
Summers, Scott L.
机构
[1] Brigham Young Univ, Marriott Sch, Dept Informat Syst, Provo, UT 84602 USA
[2] Brigham Young Univ, Marriott Sch, Sch Accountancy, Provo, UT 84602 USA
关键词
D O I
10.1145/1132469.1132474
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Model checking is an evolving technology for effective and efficient evaluation of e-business protocols. The technology is based on automated techniques such as simulation or theorem proving. E-business managers, developers, and auditors require tools to assure users that e-business systems are secure and reliable. Money atomicity, goods atomicity, and validated receipt are critical e-process requirements in addition to designing effective e-business protocols. Model checking provides verification of whether or not our system guarantees these requirements by writing them as specifications in the model checker. The model checker returns a counter example which allows the analyst to immediately see how the requirement can be violated, if a specification is not specified, which helps in modifying the system to resolve the problem. The assurance provided by model checking can ensure greater confidence in e-process and thereby increase the acceptance and legitimacy of e-business.
引用
收藏
页码:97 / 101
页数:5
相关论文
共 12 条
[1]   Model checking for E-business control and assurance [J].
Anderson, BB ;
Hansen, JV ;
Lowry, PB ;
Summers, SL .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2005, 35 (03) :445-450
[2]   Model checking for design and assurance of e-Business processes [J].
Anderson, BB ;
Hansen, JV ;
Lowry, PB ;
Summers, SL .
DECISION SUPPORT SYSTEMS, 2005, 39 (03) :333-344
[3]  
CHAUM D, 1989, P CRYPT 88, P319
[4]  
Cox B, 1995, PROCEEDINGS OF THE FIRST USENIX WORKSHOP OF ELECTRONIC COMMERCE, P77
[5]  
Heintze N, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P147
[6]  
LOWE G, 1996, P 2 INT WORKSH TOOLS, P147
[7]   Failure analysis of an E-commerce protocol using model checking [J].
Ray, I ;
Ray, I .
WECWIS 2000: SECOND INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDING, 2000, :176-183
[8]  
RAY I, 2000, P 14 ANN IFIP WG 11
[9]  
ROSCOE AW, 1995, P IEEE S SECUR PRIV, P114, DOI 10.1109/SECPRI.1995.398927
[10]  
Schuldt H, 2000, LECT NOTES COMPUT SC, V1773, P193