Abstract
An important aspect of e-business is the area of e-commerce. One of the most severe restraining factors for the proliferation of e-commerce, is the lack of trust between customers and sellers, consumer privacy concerns and the lack of security measures required to assure both businesses and customers that their business relationship and transactions will be carried out in privacy, correctly, and timely. This paper considers trust privacy and security issues in e-commerce applications and discusses methods and technologies that can be used to fulfil the pertinent requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Forrester Research. Post-web retail (September 1999), http://forrester.com/
US Census Bureau, http://www.census.gov/estats
Bhargava, B., Lilien, L., Winslett, M.: Pervasive Trust. IEEE Intelligent Systems, 74–77 (September 2004)
Kini, A., Choobineh, J.: Trust in Electronic Commerce: Definition and Theoretical Considerations. HICSS (4), 51–61 (1998)
Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys & Tutorials (2000)
ITU-T Recommendation X.509, Information Technology - Open systems interconnection - The Directory: Authentication Framework (June 1997)
ITU-T Recommendation X.509, Information Technology - Open systems interconnection - The Directory: Public-key and attribute certificate frameworks (March 2000)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy, pp. 164–173 (1996)
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System Version 2. RFC 2704 (1999)
Dillon, T., Chang, E., Khadeer, F.: Managing the Dynamic Nature of Trust. IEEE Intelligent Systems, 79–82 (September 2004)
Clarke, R.: Internet Privacy Concerns Confirm the Case for Intervention. Comm. of the ACM. 42(2) (1999)
Chung, W., Paynter, J.: Privacy Issues on the Internet. In: Proc of the 35th Hawaii Int. Conf. on System Sciences, Janauray (2002)
Brown, M., Muchira, R.: Investigating the relationship between Internet Privacy Concerns and Online Purchasing Behaviour. Journal of Electronic Commerce Research 5(1) (2004)
Araujo, I.: Privacy Mechanisms supporting the building of trust in e-commerce. In: Proc. IEEE International Workshop on Privacy Data Management, Tokyo, Japan (April 2005)
Reiter, M.K., Rubin, A.D.: Anonymous web transaction with Crowds. Comm. of the ACM 42(2) (1999)
Chaum, D.L.: Untraceable electronic mail, return address, and digital pseudonyms. Comm. of the ACM. 24(2) (1981)
Lopez, J., Oppliger, R., Pernul, G.: Authentication and Authorization Infrastructures (AAIs): A Comparative Survey. Computers & Security Journal 23 (2004)
Kiountouzis, E.: Approaches to the security of information systems. In: Katsikas, S., Gritzalis, D., Gritzalis, S. (eds.) Information Systems Security, New Technologies Publications, Athens, Greece (2004) (In Greek)
Winograd, T., Flores, F.: Understanding Computers and Cognition. Addison-Wesley, Reading (1997)
Denning, P.J.: Electronic Commerce. In: Denning, D.E., Denning, P.J. (eds.) Internet Besieged. Addison-Wesley & ACM Press (1998)
Pernul, G., Rohm, A., Herrmann, G.: Trust for Electronic Commerce Transactions. In: Eder, J., Rozman, I., Welzer, T. (eds.) ADBIS 1999. LNCS, vol. 1691, p. 1. Springer, Heidelberg (1999)
Burnett, R.: Legal aspects of e-commerce. Computing & Control Engineering Journal (2001)
Turban, E.: Electronic Commerce A Managerial Perspective. Prentice-Hall, Englewood Cliffs (2004)
Arsenault, A., Turner, S.: IETF PKIX WG, Internet draft, Internet X.509 Public Key Infrastructure PKIX Roadmap (March 10, 2000)
Lekkas, D., Katsikas, S.K., Spinellis, D.D., Gladychev, P., Patel, A.: User Requirements of Trusted Third Parties in Europe. In: Proceedings, User identification and Privacy Protection Joint IFIP WG 8.5 and WG 9.6 Working Conference, pp. 229–242 (1999)
Gritzalis, S., Katsikas, S.K., Lekkas, D., Moulinos, K., Polydorou, E.: Securing the electronic market: The KEYSTONE Public Key Infrastructure Architecture. Computers and Security 19(8), 731–746 (2000)
Katsikas, S.K., Gritzalis, S.A.: A Best Practice Guide for Secure Electronic Commerce. Upgrade III(6) (December 2002); Also in Novatica Journal of the Associacion de Tecnicos de Informatica Also in Tecnoteca Online of ALSI, http://www.upgrade-cepis.org , http://www.upgrade-cepis.org , http://www.upgrade-cepis.org
Katsikas, S.K., López, J., Pernul, G. (eds.): Trust and Privacy in Digital Business, First International Conference, TrustBus 2004. LNCS, vol. 3184, pp. 162–171. Springer, Heidelberg (2004)
Katsikas, S.K., López, J., Pernul, G. (eds.): Trust, Privacy and Security in Digital Business, Second International Conference, TrustBus 2005. LNCS, vol. 3592. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Katsikas, S.K., Lopez, J., Pernul, G. (2005). Trust, Privacy and Security in E-Business: Requirements and Solutions. In: Bozanis, P., Houstis, E.N. (eds) Advances in Informatics. PCI 2005. Lecture Notes in Computer Science, vol 3746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11573036_52
Download citation
DOI: https://doi.org/10.1007/11573036_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29673-7
Online ISBN: 978-3-540-32091-3
eBook Packages: Computer ScienceComputer Science (R0)