Skip to main content

Security in E-Commerce

  • Chapter
Lectures in E-Commerce
  • 178 Accesses

Abstract

Future networks will be open, heterogeneous and complex systems consisting of many independent nets. Classical services like e-mail and file-transfer will only be components of these information networks, which resemble more social rather than technical infrastructures. While the technical development is predictable, the social and economic direction is less clear. Security is a key factor (Schoder et al., 1998). It is, however, no longer limited to the protection from physical dangers, but rather the ability to protect virtual assets and privacy. As in any human communication, it should be seen as an element of technical communication and is a matter to be negotiated between partners. This paper describes multilateral security (Rannenberg et al., 1996) as the requirement to act self-determinedly in a global network and relates the social term “trust” and the technical term “security”. While the functions of technology are all related to cryptography, infrastructures enable communication and institutions have the task of assuring trust in functions and promises of infrastructures. Even though governments may have to change their policy towards regulation, a realm of regulations in providing future infrastructures may remain. This paper elaborates on concepts and ideas of the Kolleg “Sicherheit in der Kommunkationstechnik” (Müller et al., 1997, 1998), supported by the Gottlieb Daimler- und Karl Benz-Stiftung, Ladenburg-Berlin.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abelson, H. et al. (1997) The Risks of Key Recovety, Key Escrow, and Third party Enctyption. http://theory,ics.mit.edu/

    Google Scholar 

  • Cheswick, W. R. (1995) Firewalls and Internet Security. Add. Wesley, Reading

    Google Scholar 

  • Deering, S. et al. (1995) Internet Protocol Version 6, RFC1883, December 1995

    Google Scholar 

  • Fabre, J. (1996) FRIENDS: A Flexible Architecture for Implementing Fault Tolerant and Secure Distributed Applications. In: 2. Dependable Computing Conference, Italy, 1996

    Google Scholar 

  • Federrath, H. et al. (1996) MIXES in Mobile Communication Systems, Location management with Privacy, Proc. Workshop on Information Hiding, Cambridge, UK, 1.6.96

    Google Scholar 

  • Federrath, H. et al. (1997) Bausteine zur Realisierung mehrseitiger Sicherheit. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading

    Google Scholar 

  • Grimm, R. (1997) Sicherheit fur offene Kommunikationsnetze. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading

    Google Scholar 

  • Linn, J. (1993) Privacy Enhancement forInternet Electronic Mail, RFC 1421, February 1993

    Google Scholar 

  • Müller, G., Kohl, U., Strauß, R. (1996) Zukunftsperspektiven der digitalen Vernetzung. dpunkt, Heidelberg

    Google Scholar 

  • Müller, G., Kohl, U., Schoder, D. (1997) Unternehmenskommunikation: Telematiksysteme für vernetzte Unternehmen. Add. Wesley, Reading

    Google Scholar 

  • Müller, G., Pfitzmann, A. (eds.) (1997) Mehrseitige Sicherheit in der Kommunikationstechnik, Verfahren, Komponenten, Integration, Bd 1. Add. Wesley, Reading

    Google Scholar 

  • Müller, G., Stapf, K (eds.) (1998) Mehrseitige Sicherheit in der Kommunikationstechnik, Erwartung, Akzeptanz, Nutzung, Bd 2. Add. Wesley, Reading

    Google Scholar 

  • Müller, G., Rannenberg, K (eds.) (1999) Multilateral Security — Technology, Infrastructure, Economy, Vol. 3. Add. Wesley, Reading

    Google Scholar 

  • Rannenberg, K, Pfitzmann, A., Müller, G. (1996) Sicherheit, insbesondere mehrseitige ITSicherheit. In: Müller, G., Bunz, H. (Hrsg.) Schwerpunktheft “Sicherheit in der Kommunikationstechnik” in: Informationstechnik und Technische Informatik (it+ti) 38, Heft 4, August 1996: 7–10

    Google Scholar 

  • Schoder, D., Strauß, R., Welchering, P. (1998) Electronic Commerce Enquete 1997/98. Empirische Studie zum betriebswirtschaftlichen Nutzen von Electronic Commerce rur Unternehmen im deutschsprachigen Raum, Stuttgart 1998

    Google Scholar 

  • Schneier, B. (1995) Applied Cryptography. John Wiley, New York

    Google Scholar 

  • Spar, D. et al. (1996) Ruling the Net. Harvard Business review, May-June 1996

    Google Scholar 

  • Voydock, V. L. (1983) Security Mechanisms in High-Level Network Protocols. In: ACM Computing Surveys 15

    Google Scholar 

  • Waidner, M. (1996) Development of a Secure Electronic Marketplace for Europe. In: ESORICS, Rome 1996. Springer, Berlin Heidelberg New York Tokyo (http://www.semper.org)

    Google Scholar 

  • Westfeld, A. (1997) Steganographie am Beispiel einer Videokonferenz. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading

    Google Scholar 

  • Wilhelm, U. G. et al. (1997) Sicherheit in Corba und TINA. In: Muller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading

    Google Scholar 

  • Wolf, G. et al. (1997) Sicherheitsarchitekturen. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Wien

About this chapter

Cite this chapter

Müller, G. (2001). Security in E-Commerce. In: Werthner, H., Bichler, M. (eds) Lectures in E-Commerce. Springer, Vienna. https://doi.org/10.1007/978-3-7091-6213-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-6213-2_7

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-211-83623-1

  • Online ISBN: 978-3-7091-6213-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics