Elsevier

Computers & Security

Volume 12, Issue 6, October 1993, Pages 542-549
Computers & Security

Paradigms for verification of authorization at source of electronic documents in an integrated environment

https://doi.org/10.1016/0167-4048(93)90049-BGet rights and content

Abstract

Verification of correct authorization of an electronic document at its source is as essential as the more familiar requirement of authentication, and of increasing importance. This verification is a relatively new explicit requirement (1990) for electronic documents. Currently any checks of authorization at source are done by human elements in the receiving enterprise. Automated technology will force changes to current message processing methods to include verification of authorization at source in order to prevent fraud by esoteric attackers. This paper explains the necessity for verification of authorization at source, proposes and compares paradigms based on audit principles used with paper documents, and examines common problems of privacy and disclosure, and overheads on both sender and receiver.

References (9)

  • U.D. Black

    OSI — A Model for Computer Communications Standards

    (1991)
  • The Directory - Overview of Concepts, Models, and Services

    (1990)
  • A. Fischer

    Electronic Document Authorization

  • Information technology — Security techniques -Digital signature scheme giving message recovery

    (1990)
There are more references available in the full text version of this article.

Cited by (1)

View full text