Abstract
With the emergence of convergent information devices capable of delivering multimedia contents and providing an interactive communication with independence of location, new challenges about the implementation of secured environments for electronic business have arisen. Digital television (D-TV) uses the wire-network connections to provide interactive multimedia contents and value-added services such as electronic shopping. T-commerce (Digital Television Commerce) technologies make a dream of new business models an actuality, but these technologies lack in provision of the authentication architecture of users for the accountability, confidentiality and integrity of business contracts and personal preferences. This paper presents the architecture of authentication mechanism to deal with the specific challenges arising from these applications and to overcome the weakness of traditional architecture of the Internet commerce or m-commerce for the secured infrastructure of T-commerce business environments.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kim, D.H.: Interactive TV. Nanam (2002)
Li, Z., Bourbakis, N.G.: Digital Video and Digital TV: A Comparison and the Future Directions, pp. 545–556. Academic Press, London (2001)
Evans, B.: Understanding Digital TV. IEEE Press, Los Alamitos (1995)
Kim, G.H., Moon, M.N.: Strategy and Technology for T-Commerce. Sigma Insight (2002)
Lee, H.J.: A Study on Method Using Effectiveness Interaction TV. In: HCI Conference 2003, Korea (2003)
Tomsich, P., Katzenbeisser, S.: Towards a Secure and De-centralized Digital Wartermarking Infrastructure for the Protection of Intellectual Property. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 38–47. Springer, Heidelberg (2000)
Katzenbeisser, S., Tomsich, P.: Applied Information Security for m-Commerce and Digital Television Environment. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2001. LNCS, vol. 2115, pp. 165–175. Springer, Heidelberg (2001)
van Thanh, D.: Security Issues in Mobile eCommerce. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 467–476. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, S., Lee, H.J., Leem, C.S. (2004). Architecture of Authentication Mechanism for Emerging T-commerce Environments. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds) Advances in Multimedia Information Processing - PCM 2004. PCM 2004. Lecture Notes in Computer Science, vol 3331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30541-5_66
Download citation
DOI: https://doi.org/10.1007/978-3-540-30541-5_66
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23974-1
Online ISBN: 978-3-540-30541-5
eBook Packages: Computer ScienceComputer Science (R0)