Lightweight security primitives for E-commerce

被引:0
作者
Matias, Y [1 ]
Mayer, A [1 ]
Silberschatz, A [1 ]
机构
[1] AT&T Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
来源
PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS | 1997年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended client-server relationships. For example, consider a web-site (server) which offers repeated authenticated personalized stock quotes to each of its subscribers (clients). The value of a single transaction (e.g., delivery of a web-page with a customized set of quotes) does not warrant the cost of executing a handshake and key distribution protocol. Also, a client might not always use the same machine during such an extended relationship (e.g., a PC at home, a laptop on a trip). Typical transport/session-layer security mechanisms such as SSL and S-HTTP either require handshake/key distribution for each transaction or do not support client mobility. We propose a new security framework for extended relationships between clients and servers, based on persistent shared keys. We argue that this is a preferred model for inexpensive transactions executing within extended relationships. Our main contribution is the design and implementation of a set of lightweight application-layer primitives, for (1) generating and maintaining persistent shared keys without requiring a client to store any information between transactions and (2) securing a wide range of web-transactions (e.g., subscription, authenticated and/or private delivery of information, receipts) with adequate computational cost. Oar protocols require public key infrastructure only for servers/vendors, and its usage only once per client (upon first interaction).
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
[41]   e-Commerce security - A life cycle approach [J].
Sengupta, A ;
Mazumdar, C ;
Barik, MS .
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2005, 30 (2-3) :119-140
[42]   Privacy and security the drivers for growth of E-commerce [J].
Hinde, S .
COMPUTERS & SECURITY, 1998, 17 (06) :475-478
[43]   The Application of VMware in Teaching for E-commerce Security [J].
Dai, Jie-qiang ;
Wu, Cui-hong .
INTERNATIONAL CONFERENCE ON MODERN EDUCATION AND INFORMATION TECHNOLOGY (MEIT 2017), 2017, :278-281
[44]   The Viewpoint of E-Commerce Security in the Digital Economy [J].
Priescu, Iustin ;
Patriciu, Victor Valeriu ;
Nicolaescu, Sebastian .
INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, :431-+
[45]   e-commerce and security governance in developing countries [J].
Sanayei, Ali ;
Rajabion, Lila .
GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 :288-+
[46]   The program is assessing the level of security of e-commerce [J].
Oladko, Vladlena S. .
VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2015, 33 (04) :46-53
[47]   Cryptography based E-commerce security: A review [J].
Yasin, Shazia ;
Haseeb, Khalid ;
Qureshi, Rashid Jalal .
International Journal of Computer Science Issues, 2012, 9 (02) :132-137
[48]   Security in e-commerce and the economics of immediate satisfaction [J].
Zhang, Min ;
Jiang, Renguo ;
Hu, Haiqing .
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, :588-+
[49]   Strategies for The Security of Online Payments in E-commerce [J].
Zhang, Chen ;
Jiang, Shijie ;
Huang, Bin .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, :1149-1151
[50]   Research on an agile protocol for E-commerce security [J].
Yong, W ;
Xiong, QX .
DCABES 2004, Proceedings, Vols, 1 and 2, 2004, :990-993