Actas de congresos
E-commerce And Fair Exchange - The Problem Of Item Validation
Registro en:
9789898425713
Secrypt 2011 - Proceedings Of The International Conference On Security And Cryptography. , v. , n. , p. 317 - 324, 2011.
2-s2.0-80052483786
Autor
Piva F.
Dahab R.
Institución
Resumen
Fair exchange protocols have been widely studied since their proposal, but are still not implemented on most ecommerce transactions available. For several types of digital items (e-goods), the current e-commerce business models fail to provide fairness to customers. The item validation problem is a critical step in fair exchange, and is yet to receive the proper attention from researchers. We believe these issues should be addressed in a comprehensive and integrated fashion before fair exchange protocols can be effectively deployed in the marketplace. This is the aim of our research, and drawing attention to these problems and possible solutions is the goal of this paper.
317 324 Inst. Syst. Technol. Inf., Control Commun. (INSTICC) Asokan, N., Fairness in electronic commerce (1998) Research Report RZ3027 Bottoni, A., Dini, G., Stabell-Kulø, T., A methodology for verification of digital items in fair exchange protocols with active trustee (2007) Electronic Commerce Research, 7, p. 2 Cheng, H., Li, X., Partial encryption of compressed images and videos (2000) Signal Processing, IEEE Transactions on, 48 (8), pp. 2439-2451 Gartner, F.C., Pagnia, H., Vogt, H., Approaching a formal definition of fairness in electronic commerce (1999) SRDS Kremer, S., Markowitch, O., Zhou, J., An intensive survey of fair non-repudiation protocols (2002) Computer Communications, 25 (17), pp. 1606-1621 Kwong, S., An algorithm for removable visible watermarking (2006) IEEE Transactions on Circuits and Systems for Video Technology, 16 (1), pp. 129-133 Lacoste, G., Pfitzmann, B., Steiner, M., Waidner, M., SEMPER - Secure electronic marketplace for europe (2000) Lecture Notes in Computer Science (LNCS), 1854 Lian, S., (2009) Multimedia Content Encryption: Techniques and Applications Loytynoja, M., Cvejic, N., Seppanen, T., Audio protection with removable watermarking (2007) 2007 6th International Conference on Information, Communications & Signal Processing, pp. 1-4. , IEEE Markowitch, O., Roggeman, Y., Probabilistic non-repudiation without trusted third party (1999) Second Workshop on Security in Communication Network ̃ 99 Minder, L., Cryptography based on error correcting codes (2007) Algo.epfl.ch Nenadic, A., Zhang, N., Barton, S., FIDES -A middleware ECommerce security solution (2004) The 3rd European Conference on Information Warfare and Security (ECIW), pp. 295-304 Piva, F.R., (2009) Verificação Formal de Protocolos de Trocas Justas Utilizando O Método de Espaços de Fitas, , Master's thesis, UNICAMP Piva, F.R., Monteiro, J.R.M., Dahab, R., Strand spaces and fair exchange: More on how to trace attacks and security problems (2007) Anais Do VII SBSeg, Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais Piva, F.R., Monteiro, J.R.M., Dahab, R., Regarding timeliness in the context of fair exchange (2009) Network and Service Security, 2009. N2S 09. International Conference on, pp. 1-6 Piva, F.R., Monteiro, J.R.M., Devegili, A.J., Dahab, R., Applying strand spaces to certified delivery proofs (2006) Anais Do VI SBSeg, Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais Servetti, A., Testa, C., Martin, J.D., Frequency-selective partial encryption of compressed audio (2003) IEEE International Conference on Aucoustics Thayer, F.J., Herzog, J.C., Guttman, J.D., Strand spaces: Proving security protocols correct (1999) Journal of Computer Security, 7 (2-3), pp. 191-230 Valimaki, M., Oksanen, V., (2006) DRM Interoperability and Intellectual Property Policy in Europe Vogt, H., Asynchronous optimistic fair exchange based on revocable items (2003) Financial Cryptography, pp. 208-222