Skip to main content

Enhanced Accountability for Electronic Processes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2995))

Abstract

This paper proposes that accountability in electronic processes is enhanced by sharing certified event data between the participants. Enhancing transparency of processes allows those with the contextual information to understand the process and interactions to spot mistakes or fraud that others may miss. Enabling the sharing of this information makes accountability more interactive and allows for both a more intelligent and faster response to problems. This paper describes an evidence store that supports this level of interactivity thereby enabling interactive and intelligent accountability.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, C., Cain, P., Pinkas, D., Zuccherato, R.: – RFC 3161 Internet X.509 Public Key Infrastructure Time Stamp Protocol, TSP (2001), http://www.ietf.org/rfc/rfc3161

  2. Baldwin, A., Shiu, S., Casassa Mont, M.: Trust Services: A Framework for Service based Solutions. In: Proceedings of the 26th IEEE COMPSAC (2002)

    Google Scholar 

  3. Baldwin, A., Shiu, S.: Enabling Shared Audit Data. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 14–28. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Baldwin, A., Shiu, S.: Hardware Encapsulation of Security Services. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 201–216. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Bayer, D., Haber, S.A., Stornetta, W.S.: Improving the efficiency and reliability of digital time-stamping. In: Sequences 1991: Methods in Communication Security and Computer Science, pp. 329–334. Springer, Heidelberg (1992)

    Google Scholar 

  6. Bellare, M., Yee, B.: Forward-Security in Private-Key Cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 1–18. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of IEEE Conference on Security and Privacy (1996)

    Google Scholar 

  8. Ferreira, A., Shiu, S., Baldwin, A.: Towards Accountability for Electronic Patient Records. In: The 16th IEEE Symposium on Computer-Based Medical Systems, June 26-27 (2003)

    Google Scholar 

  9. Fips: Security Requirements for cryptographic modules. Fips 140-2 2001

    Google Scholar 

  10. Grandison, T., Sloman, M.: Trust management tools for internet applications. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 91–107. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Grimsley, M., Meeham, A., Green, G., Staffor, B.: Social capital, community trust and e-government services. In: Proceedings of 1st International conference on trust management (2003)

    Google Scholar 

  12. Haber, S.A., Stornetta, W.S.: How to timestamp a digital document. Journal of Cryptography 3(2), 88–111 (1991)

    Google Scholar 

  13. Itoi, N.: Secure Coprocessor Integration with Kerberos V5.USENIX Security (2000)

    Google Scholar 

  14. Josang, A., Tran, N.: Trust Management for E-Commerce. In: Proceedings Virtual Banking (2000), http://195.13.121.137/virtualbanking2000/index.htm

  15. Merkle, R.C.: Protocols for Public Key Cryptography. In: IEEE Symposium on Security and Privacy, pp. 122–134 (1980)

    Google Scholar 

  16. O’Neill, O.: Question of Trust: BBC Reith Lectures 2002. Cambridge University Press, Cambridge (2002)

    Google Scholar 

  17. Pato, J.: Identity Management - Encyclopedia of Information Security. Kluwer, Dordrecht (2003) (TR HPL-2003-72)

    Google Scholar 

  18. Pearson, S., Balacheff, B., Chen, L., Plaquin, D., Proudler, G.: Trusted Computing Platforms: TCPA technology in comtext. HP Books, Prentice Hall (2002)

    Google Scholar 

  19. RSA Labs: PKCS#11 v2.11 Cryptographic Token Interface Standard (2001)

    Google Scholar 

  20. Schneier, B., Kelsey, J.: Cryptographic Support for Secure Logs on Untrusted Machines. In: 7th USENIX Security Symposium Proceedings, USENIX Press (1998)

    Google Scholar 

  21. Smith, S.W., Palmer, E.R., Weingart, S.: Using a High Performance Programmable Secure Coprocessor. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 73–89. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  22. Smith, S.W., Safford, D.: Practical Private information retrieval with secure coprocessors. IBM Research T.J. Watson Research Centre (2000)

    Google Scholar 

  23. Ungureanu, V., Vesuma, F., Minsky, N.H.: A policy-based access control mechanism for the corporate Web. In: Proceedings of ACSAS 2000, IEEE, Los Alamitos (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Baldwin, A. (2004). Enhanced Accountability for Electronic Processes. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds) Trust Management. iTrust 2004. Lecture Notes in Computer Science, vol 2995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24747-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24747-0_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21312-3

  • Online ISBN: 978-3-540-24747-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics