Abstract
The Common Electronic Purse Specifications (CEPS) define requirements for all components needed by an organization to implement a globally interoperable electronic purse program. In this paper we describe how we model purchase transaction protcol in CEPS using formal specification language. We define and verify the money accountability property of the CEPS, and we address its violation scenario in the presence of communication network failures. Using model checking technique we find that transaction record stored in the trusted-third party plays a essential role in satisfying the accountability property.
Keywords
This work was supported by Korea Research Foundation Grant (KRF-2003-003-D00397).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
CEPSCO, Common Electronic Purse Specification, Business Requirements vers. 7.0, Functional Requirements vers. 6.3, Technical Specification vers.2.2 (2000), http://www.cepsco.com
Cox, B., Tygar, J.D., Sirbu, M.: NetBill Security and Transaction Protocol. In: Proceedings of the First USENIX Workshop in Electronic Commerce, July 1995, pp. 77–88 (1995)
Heintze, N., Tygar, J., Wing, J., Wong, H.: Model Checking Electronic Commerce Protocols. In: Adam, N.R., Yesha, Y. (eds.) Electronic Commerce 1994. LNCS, vol. 1028, pp. 146–164. Springer, Heidelberg (1996)
Flat, A., Chaaum, D., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 200–212. Springer, Heidelberg (1990)
Kim, I.G., Kim, H.S., Lee, J.Y., Choi, J.Y.: Analysis and Modification of ASK Mobile Security Protocol. In: Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, July 2005, pp. 79–83 (2005)
Jürjens, J., Wimmel, G.: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. In: Proceedings of the IFIP conference on towards the E-society, pp. 489–506 (2001)
Ray, I., Ray, I.: Failure Analysis and E-commerce Protocol using Model Checking. In: Proceedings of the Second International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems, June 2000, pp. 176–183 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, IG., Moon, YJ., Kang, I., Lee, JY., Han, KH., Choi, JY. (2005). Model-Based Analysis of Money Accountability in Electronic Purses. In: Deng, X., Ye, Y. (eds) Internet and Network Economics. WINE 2005. Lecture Notes in Computer Science, vol 3828. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11600930_34
Download citation
DOI: https://doi.org/10.1007/11600930_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30900-0
Online ISBN: 978-3-540-32293-1
eBook Packages: Computer ScienceComputer Science (R0)