Skip to main content

Securing Large E-Commerce Networks

  • Conference paper
Information Security and Privacy (ACISP 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1841))

Included in the following conference series:

  • 521 Accesses

Abstract

The Chambers of Commerce (CoCs) have to integrate into the emerging Public Key Infrastracture (PKI) which will be a prerequisite for secure Electronic Commerce (E-commerce). To fulfil the future requirements of E-commerce the CoCs need a secure communication channel between each other and the ability to ensure electronic documents of customers to be verified by any third party. In this paper we present a new Trusted Third Party (TTP) service which allows a large chain of different CoCs, that act as Certification Authorities (CAs), to interoperate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, C., Chain, P., Pinkas, D., Zuccherato, R.: Internet Public Key Infrastructure, Part V: Timestamp protocols, PKIX Working Group Draft (March 1998)

    Google Scholar 

  2. ACTS/SEMPER Project Secure Electronic Market Place for Europe (1995)

    Google Scholar 

  3. ANSI X3.92 Data Encryption Standard

    Google Scholar 

  4. Ahuja, V.: Network & Internet Security. Academic Press, New York (1996)

    Google Scholar 

  5. Architecture for Public Key Infrastructure (APKI), Draft 1, The Open Group (May 1997)

    Google Scholar 

  6. Camp, L.J., Sirbu M.: Critical Issues in Internet Commerce. IEEE Communications Magazine 58–62 (1997)

    Google Scholar 

  7. CEN/CENELEC/ETSI ITAEGV/N231, M-IT-06, Taxonomy and Directory of European Standardization Requirements for Information Systems Security, Issue 2.1 (October 1994)

    Google Scholar 

  8. Colleran, A.: Standardization Issues for the European Trusted Services - ETS, Quercus Information (May 1997)

    Google Scholar 

  9. Communications of the ACM Special Issue: Electronic Commerce, vol. 39(6) (June 1996)

    Google Scholar 

  10. COMPUTER Network Security. Special Issue vol. 31(9) (1998)

    Google Scholar 

  11. Froomkin, A.: The Essential Role of Trusted Third Parties in Electronic Commerce (October 1996)

    Google Scholar 

  12. Goodman, D., Robbins, C.: Understanding LDAP & X.500 (September 1998)

    Google Scholar 

  13. Gre, P., Rotenberg, M.: Technology and Privacy: The New Landscape. MIT Press, Cambridge (1998)

    Google Scholar 

  14. INFOSEC/ETS II/BESTS Project Business Environment Study of Trusted Services (1998)

    Google Scholar 

  15. INFOSEC/ETS 1996: Legal, Ethical & Regulatory Issues concerning the TTPs and Digital Signatures

    Google Scholar 

  16. INFOSEC/TTP Project, Trusted Third Party Services: Functional Model, Muller, P. (ed.), Ver. 1.1, Bull Ingenierie, France (December 1993)

    Google Scholar 

  17. ISO/IEC 10118-2:92 Hash Function for digital signatures Part2: Hash Functions using a symmetric block-cipher algorithm

    Google Scholar 

  18. ISO/IEC 9796:91 Information Technology- Security Techniques-Digital Signature Scheme giving message recovery

    Google Scholar 

  19. IEC DIS 11577 Network Layer Security Protocol

    Google Scholar 

  20. IEC DIS 9594-8 X.509 The Directory Authentication Framework

    Google Scholar 

  21. ISO/IEC JTC 1/SC27 N691, Guidelines on the use and management of Trusted Third Party Services (August 1993)

    Google Scholar 

  22. ISO/IEC JTC1/SC27/WG2 Security Techniques, Security Mechanisms DIS 9796

    Google Scholar 

  23. ISO/IEC X.509 RSA Public Key Certificates

    Google Scholar 

  24. Kaliski, B.: PKCS 10 Certification Request Syntax Standard. RFC 2314 (March 1998)

    Google Scholar 

  25. Kaliski, B.: PKCS 7 Cryptographic Message Syntax Standard. RFC 2314 (March 1998)

    Google Scholar 

  26. Menezes, A.J., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  27. Meyers, M., et al.: X.509 Internet Public Key Infrastracture On Line Certificate Status Protocol (OSCP) (June 1999)

    Google Scholar 

  28. Pfleeger, S.L.: A Framework for Security Requirements. Computers and Security 10(6), 515–523 (1991)

    Article  Google Scholar 

  29. Polemi, D.: Securing E-Commerce. Proceedings of the International e-Commerce Conference, IECC 1999 (1999)

    Google Scholar 

  30. Schneier, B.: Applied Cryptography, Protocols, Algorithms and Source Code in C, 2nd edn. J. Wiley and Sons Inc., Chichester (1996)

    MATH  Google Scholar 

  31. Simmons, G.J.: Contemporary cryptography: The science of information integrity. IEEE Press, Los Alamitos (1992)

    MATH  Google Scholar 

  32. Stallings, W.: Network and Internet Security: Principles and Practice. Prentice Hall, Englewood Cliffs (1995)

    Google Scholar 

  33. The Burton Group, Public Key Infrastructure. Network Stratege Report (1997)

    Google Scholar 

  34. Telematics Engineering/ICE-TEL Project, Architecture and General Specifications of the Public Key Infrastructure, COST (September 1996)

    Google Scholar 

  35. Dierks, T., et al.: The TLS Protocol v.1.0 (June 1999)

    Google Scholar 

  36. Fielding, R., et al.: Hypertext Transfer Protocol—HTTP/1.1 (June 1999)

    Google Scholar 

  37. Open Secure Certificate Architecture (OSCAR), Security Unit, Distributed Systems Technology Centre, Australia http://oscar.dstc.qut.edu.au

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sklavos, P., Varvitsiotis, A., Polemi, D. (2000). Securing Large E-Commerce Networks. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_11

Download citation

  • DOI: https://doi.org/10.1007/10718964_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67742-0

  • Online ISBN: 978-3-540-45030-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics