Abstract
Digital cash, analogous to the paper cash, is a certificate that carries a value. It is issued by an authorized entity and is verifiable by all. It can be used as an instrument for making payments or purchases. Unlike paper cash, being a digital data, it may be easily replicated which gives a scope for duplicate spending of the cash certificates. Digital cash based payment systems can be classified as business critical systems as any failure may lead to loss of trust. Verification of critical requirements of such systems is therefore essential. In this paper, we present refinement approach for construction of the models of the digital cash based payment system using Event-B, wherein we verify how money atomicity property can be preserved in these systems. This ensures that money is neither generated nor destroyed in the electronic payment transactions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abrial, J.R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)
Abrial, J.R.: A System Development Process with Event-B and the Rodin Platform. In: Butler, M., Hinchey, M.G., Larrondo-Petrie, M.M. (eds.) ICFEM 2007. LNCS, vol. 4789, pp. 1–3. Springer, Heidelberg (2007)
Abrial, J.-R.: Train Systems. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 1–36. Springer, Heidelberg (2006)
Abrial, J.-R., Cansell, D., Méry, D.: A mechanically proved and incremental development of IEEE 1394 tree identify protocol. Formal Aspects of Computing 14(3), 215–227 (2003)
Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET Purchase Protocols. Journal of Automated Reasoning 36(1-2), 5–37 (2006)
Bella, G., Massacci, F., Paulson, L., Tramontano, P.: Formal Verification of Card holder Registration in SET. IEEE Journal on Selected Areas in Communications 21(1), 77–87 (2003)
Butler, M., Yadav, D.: An incremental development of the mondex system in Event-B. Formal Aspects of Computing 20(1), 61–77 (2008)
Butler, M.: On the use of data refinement in the development of secure communications systems. Formal Aspects of Computing 14(1), 2–34 (2002)
Butler, M.: An Approach to the Design of Distributed Systems with B AMN. In: Bowen, J.P., Hinchey, M.G., Till, D. (eds.) ZUM 1997. LNCS, vol. 1212, pp. 223–241. Springer, Heidelberg (1997)
Chandra, G., Yadav, D.: Analyzing Data Flow in Trustworthy Electronic Payment Systems Using Event-B. In: Kannan, R., Andres, F. (eds.) ICDEM 2010. LNCS, vol. 6411, pp. 325–332. Springer, Heidelberg (2012)
Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Freitas, L., Woodcock, J.: Mechanising Mondex with Z/Eves. Formal Aspects of Computing 20(1), 117–139 (2008)
Gouda, M.G., Liu, A.X.: Formal Specification and Verification of a Secure Micropayment Protocol. International Journal of Network Security 7(1), 81–87 (2008)
Haneberg, D., Grandy, H., Reif, W., Schellhorn, G.: Verifying Smart Card Applications: An ASM Approach. In: Davies, J., Gibbons, J. (eds.) IFM 2007. LNCS, vol. 4591, pp. 313–332. Springer, Heidelberg (2007)
Heintze, N., Tygar, J.D., Wing, J., Chi Wong, H.: Model checking electronic commerce protocols. In: Proc. of the Second USENIX Workshop on Electronic Commerce, Oakland, California, pp. 147–164 (1996)
Katsaros, P.: A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach. Information and Software Technology 51(2), 235–257 (2009)
Kessler, V., Neumann, H.: A Sound Logic for Analysing Electronic Commerce Protocols. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 345–360. Springer, Heidelberg (1998)
Laibinis, L., Troubitsyna, E., Leppänen, S., Lilius, J., Malik, Q.A.: Formal Service-Oriented Development of Fault Tolerant Communicating Systems. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 261–287. Springer, Heidelberg (2006)
Lu, S., Smolka, S.: Model Checking the Secure Electronic Transaction (SET) Protocol. In: Proc. of 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 358–365. IEEE Computer Society, Washington, DC (1999)
Meadows, C., Syverson, P.: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 122–140. Springer, Heidelberg (1998)
Panti, M., Spalazzi, L., Tacconi, S., Valenti, S.: Automatic verification of security in payment protocols for electronic commerce. In: Piattini, M., Filipe, J., Braz, J. (eds.) Enterprise Information Systems IV, pp. 276–282. Kluwer Academic Publishers, MA (2003)
Prisco, R.D., Fekete, A., Lynch, N., Shvartsman, A.: A dynamic view-oriented group communication service. In: PODC 1998: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pp. 227–236. ACM Press, NY (1998)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, Inc., Singapore (1996)
Woodcock, J., Larsen, P.G., Bicarregui, J., Fitzgerald, J.: Formal methods: Practice and experience. ACM Computing Surveys 41(4), 1–36 (2009)
Yadav, D., Butler, M.: Rigorous Design of Fault-Tolerant Transactions for Replicated Database Systems Using Event B. In: Butler, M., Jones, C.B., Romanovsky, A., Troubitsyna, E. (eds.) Fault-Tolerant Systems. LNCS, vol. 4157, pp. 343–363. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chandra, G., Yadav, D. (2012). Verification of Money Atomicity in Digital Cash Based Payment System. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-35130-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35129-7
Online ISBN: 978-3-642-35130-3
eBook Packages: Computer ScienceComputer Science (R0)