Abstract
The Chambers of Commerce (CoCs) have to integrate into the emerging Public Key Infrastracture (PKI) which will be a prerequisite for secure Electronic Commerce (E-commerce). To fulfil the future requirements of E-commerce the CoCs need a secure communication channel between each other and the ability to ensure electronic documents of customers to be verified by any third party. In this paper we present a new Trusted Third Party (TTP) service which allows a large chain of different CoCs, that act as Certification Authorities (CAs), to interoperate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adams, C., Chain, P., Pinkas, D., Zuccherato, R.: Internet Public Key Infrastructure, Part V: Timestamp protocols, PKIX Working Group Draft (March 1998)
ACTS/SEMPER Project Secure Electronic Market Place for Europe (1995)
ANSI X3.92 Data Encryption Standard
Ahuja, V.: Network & Internet Security. Academic Press, New York (1996)
Architecture for Public Key Infrastructure (APKI), Draft 1, The Open Group (May 1997)
Camp, L.J., Sirbu M.: Critical Issues in Internet Commerce. IEEE Communications Magazine 58–62 (1997)
CEN/CENELEC/ETSI ITAEGV/N231, M-IT-06, Taxonomy and Directory of European Standardization Requirements for Information Systems Security, Issue 2.1 (October 1994)
Colleran, A.: Standardization Issues for the European Trusted Services - ETS, Quercus Information (May 1997)
Communications of the ACM Special Issue: Electronic Commerce, vol. 39(6) (June 1996)
COMPUTER Network Security. Special Issue vol. 31(9) (1998)
Froomkin, A.: The Essential Role of Trusted Third Parties in Electronic Commerce (October 1996)
Goodman, D., Robbins, C.: Understanding LDAP & X.500 (September 1998)
Gre, P., Rotenberg, M.: Technology and Privacy: The New Landscape. MIT Press, Cambridge (1998)
INFOSEC/ETS II/BESTS Project Business Environment Study of Trusted Services (1998)
INFOSEC/ETS 1996: Legal, Ethical & Regulatory Issues concerning the TTPs and Digital Signatures
INFOSEC/TTP Project, Trusted Third Party Services: Functional Model, Muller, P. (ed.), Ver. 1.1, Bull Ingenierie, France (December 1993)
ISO/IEC 10118-2:92 Hash Function for digital signatures Part2: Hash Functions using a symmetric block-cipher algorithm
ISO/IEC 9796:91 Information Technology- Security Techniques-Digital Signature Scheme giving message recovery
IEC DIS 11577 Network Layer Security Protocol
IEC DIS 9594-8 X.509 The Directory Authentication Framework
ISO/IEC JTC 1/SC27 N691, Guidelines on the use and management of Trusted Third Party Services (August 1993)
ISO/IEC JTC1/SC27/WG2 Security Techniques, Security Mechanisms DIS 9796
ISO/IEC X.509 RSA Public Key Certificates
Kaliski, B.: PKCS 10 Certification Request Syntax Standard. RFC 2314 (March 1998)
Kaliski, B.: PKCS 7 Cryptographic Message Syntax Standard. RFC 2314 (March 1998)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Meyers, M., et al.: X.509 Internet Public Key Infrastracture On Line Certificate Status Protocol (OSCP) (June 1999)
Pfleeger, S.L.: A Framework for Security Requirements. Computers and Security 10(6), 515–523 (1991)
Polemi, D.: Securing E-Commerce. Proceedings of the International e-Commerce Conference, IECC 1999 (1999)
Schneier, B.: Applied Cryptography, Protocols, Algorithms and Source Code in C, 2nd edn. J. Wiley and Sons Inc., Chichester (1996)
Simmons, G.J.: Contemporary cryptography: The science of information integrity. IEEE Press, Los Alamitos (1992)
Stallings, W.: Network and Internet Security: Principles and Practice. Prentice Hall, Englewood Cliffs (1995)
The Burton Group, Public Key Infrastructure. Network Stratege Report (1997)
Telematics Engineering/ICE-TEL Project, Architecture and General Specifications of the Public Key Infrastructure, COST (September 1996)
Dierks, T., et al.: The TLS Protocol v.1.0 (June 1999)
Fielding, R., et al.: Hypertext Transfer Protocol—HTTP/1.1 (June 1999)
Open Secure Certificate Architecture (OSCAR), Security Unit, Distributed Systems Technology Centre, Australia http://oscar.dstc.qut.edu.au
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sklavos, P., Varvitsiotis, A., Polemi, D. (2000). Securing Large E-Commerce Networks. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_11
Download citation
DOI: https://doi.org/10.1007/10718964_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67742-0
Online ISBN: 978-3-540-45030-6
eBook Packages: Springer Book Archive