Certificate-based distributed firewalls for secure e-commerce transactions

被引:0
|
作者
Djordjevic, I [1 ]
Phillips, C [1 ]
机构
[1] Univ London Queen Mary Coll, Dept Elect Engn, London E1 4NS, England
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Conventional firewalls rely on restricted topology and controlled entry points to regulate the flow of information into and out from an organisation. This paper describes a novel distributed firewall architecture combined with a secure communication mechanism, where one or more administration facilities control many concurrent distributed firewall instantiations localised to individual host terminals, be it a personal computer or mobile communications device. Each host instantiation enables its client user(s) to be members of one or more closed user groups (CUGs) for the purpose of business transactions. All hosts then become part of a large distributed firewall providing all the features offered by a traditional flrewall choke point with improved security and better scalability, and avoiding topological restrictions. To prevent the inadvertent passage of data to the wrong groups, either within or without an organisation, the distributed firewall is augmented by a mechanism of certification that governs the firewall behaviour. Data is typically encrypted by the application/firewall using certified keys such that only members of the same CUG can decrypt the data. Policy control and certificate distribution is handled by selected administration nodes; however, once formed, peer-to-peer CUG communication can take place directly.
引用
收藏
页码:14 / 19
页数:6
相关论文
共 50 条
  • [31] Design methodology for secure distributed transactions in electronic commerce
    Portillo, E
    Patel, A
    COMPUTER STANDARDS & INTERFACES, 1999, 21 (01) : 5 - 18
  • [32] Will E-commerce ever be secure enough?
    Agnew, G
    COMPUTER, 1999, 32 (03) : 71 - 71
  • [33] Design methodology for secure distributed transactions in electronic commerce
    Portillo, Eloy
    Patel, Ahmed
    Computer Standards and Interfaces, 1999, 21 (01): : 5 - 18
  • [34] Certificate-based access control for widely distributed resources
    Thompson, M
    Johnston, W
    Mudumbai, S
    Hoo, G
    Jackson, K
    Essiari, A
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 215 - 227
  • [35] E-commerce transactions, the installed base of credit cards, and the potential mobile E-commerce adoption
    Madden, Gary
    Banerjee, Aniruddha
    Rappoport, Paul N.
    Suenaga, Hiroaki
    APPLIED ECONOMICS, 2017, 49 (01) : 21 - 32
  • [36] A Parallel Methodology for Reduction of Coupling in Distributed Business-to-Business E-Commerce Transactions
    Orme, Anthony Mark
    Etzkorn, Letha H.
    JOURNAL OF ELECTRONIC COMMERCE IN ORGANIZATIONS, 2007, 5 (03) : 52 - 67
  • [37] Certificate-based forward secure signature scheme without pairings
    School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China
    Tiedao Xuebao, 2013, 11 (45-50):
  • [38] Certificate-based encoding of gate level description for secure transmission
    Ghosal, Sandip
    Mitra, Debasis
    Bhattacharjee, Subhasis
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (01) : 54 - 75
  • [39] A Provably Secure Certificate-based Signature Scheme with Bilinear Pairings
    Zhang Jianhong
    Chen Hua
    Yang Yixian
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 1271 - +
  • [40] Provably secure certificate-based signature scheme without pairings
    1600, Centre for Environment Social and Economic Research, Post Box No. 113, Roorkee, 247667, India (51):