Certificate-based distributed firewalls for secure e-commerce transactions

被引:0
|
作者
Djordjevic, I [1 ]
Phillips, C [1 ]
机构
[1] Univ London Queen Mary Coll, Dept Elect Engn, London E1 4NS, England
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Conventional firewalls rely on restricted topology and controlled entry points to regulate the flow of information into and out from an organisation. This paper describes a novel distributed firewall architecture combined with a secure communication mechanism, where one or more administration facilities control many concurrent distributed firewall instantiations localised to individual host terminals, be it a personal computer or mobile communications device. Each host instantiation enables its client user(s) to be members of one or more closed user groups (CUGs) for the purpose of business transactions. All hosts then become part of a large distributed firewall providing all the features offered by a traditional flrewall choke point with improved security and better scalability, and avoiding topological restrictions. To prevent the inadvertent passage of data to the wrong groups, either within or without an organisation, the distributed firewall is augmented by a mechanism of certification that governs the firewall behaviour. Data is typically encrypted by the application/firewall using certified keys such that only members of the same CUG can decrypt the data. Policy control and certificate distribution is handled by selected administration nodes; however, once formed, peer-to-peer CUG communication can take place directly.
引用
收藏
页码:14 / 19
页数:6
相关论文
共 50 条
  • [21] Provably secure certificate-based encryption with leakage resilience
    Guo, Yuyan
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    Zhang, Futai
    THEORETICAL COMPUTER SCIENCE, 2018, 711 : 1 - 10
  • [22] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [23] A Forward-Secure Certificate-Based Signature Scheme
    Li, Jiguo
    Teng, Huiyun
    Huang, Xinyi
    Zhang, Yichen
    Zhou, Jianying
    COMPUTER JOURNAL, 2015, 58 (04): : 853 - 866
  • [24] Improved Fraud Detection in e-Commerce Transactions
    Shaji, Jisha
    Panchal, Dakshata
    2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, COMPUTING AND IT APPLICATIONS (CSCITA), 2017, : 121 - 126
  • [25] Fraud Analysis and Prevention in e-Commerce Transactions
    Caldeira, Evandro
    Brandao, Gabriel
    Pereira, Adriano C. M.
    2014 9TH LATIN AMERICAN WEB CONGRESS (LA-WEB), 2014, : 42 - 49
  • [26] E-Commerce with Rich Clients and Flexible Transactions
    Clarke, Dylan
    Morgan, Graham
    FIRST INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE DEPENDABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2009, : 73 - 77
  • [27] A secured web browser for e-commerce transactions
    Dellisanti, B
    Dunning, LA
    Ramakrishnan, S
    Proceedings of the ISCA 20th International Conference on Computers and Their Applications, 2005, : 232 - 235
  • [28] A Secure and Efficient Authentication in E-Commerce
    Kumbhakar, Dulal
    Sanyal, Kanchan
    Karforma, Sunil
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2021, 14 (05): : 93 - 99
  • [29] PKI is key to secure e-commerce
    不详
    IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (03) : 64 - 64
  • [30] Research on E-Commerce Secure Technology
    Li Yuewen
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,