Certificate-based distributed firewalls for secure e-commerce transactions

被引:0
|
作者
Djordjevic, I [1 ]
Phillips, C [1 ]
机构
[1] Univ London Queen Mary Coll, Dept Elect Engn, London E1 4NS, England
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Conventional firewalls rely on restricted topology and controlled entry points to regulate the flow of information into and out from an organisation. This paper describes a novel distributed firewall architecture combined with a secure communication mechanism, where one or more administration facilities control many concurrent distributed firewall instantiations localised to individual host terminals, be it a personal computer or mobile communications device. Each host instantiation enables its client user(s) to be members of one or more closed user groups (CUGs) for the purpose of business transactions. All hosts then become part of a large distributed firewall providing all the features offered by a traditional flrewall choke point with improved security and better scalability, and avoiding topological restrictions. To prevent the inadvertent passage of data to the wrong groups, either within or without an organisation, the distributed firewall is augmented by a mechanism of certification that governs the firewall behaviour. Data is typically encrypted by the application/firewall using certified keys such that only members of the same CUG can decrypt the data. Policy control and certificate distribution is handled by selected administration nodes; however, once formed, peer-to-peer CUG communication can take place directly.
引用
收藏
页码:14 / 19
页数:6
相关论文
共 50 条
  • [41] A flexible integration model for web-based e-commerce transactions
    Adiele, C
    Ehikioya, SA
    COMPUTERS AND THEIR APPLICATIONS, 2004, : 87 - 91
  • [42] A CORBA-based approach for conducting trusted E-commerce transactions
    Chowdhry, BS
    Sial, MY
    PROCEEDINGS OF THE WORLD ENGINEERS' CONVENTION 2004, VOL A, NETWORK ENGINEERING AND INFORMATION SOCIETY, 2004, : 143 - 147
  • [43] Provably Secure Certificate-Based Signcryption Scheme without Pairings
    Lu, Yang
    Li, Jiguo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2554 - 2571
  • [44] Provably secure certificate-based signature scheme without pairings
    Li, Jiguo
    Wang, Zhiwei
    Zhang, Yichen
    INFORMATION SCIENCES, 2013, 233 : 313 - 320
  • [45] Simulatable and secure certificate-based threshold signature without pairings
    Wang, Feng
    Chang, Chin-Chen
    Harn, Lein
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2094 - 2103
  • [46] Towards secure e-commerce based on virtualization and attestation techniques
    Stumpf, Frederic
    Eckert, Claudia
    Balfe, Shane
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 376 - +
  • [47] Using OCSP to secure certificate-using transactions in m-commerce
    Muñoz, JL
    Forné, J
    Esparza, O
    Soriano, BM
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 280 - 292
  • [48] Work-flow based multi-domain certificate in e-commerce
    Fang, ZY
    Feng, Y
    Liu, Z
    Zhang, J
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, 2004, : 248 - 252
  • [49] Consumer-perceived risk in e-commerce transactions
    Salam, AF
    Rao, HR
    Pegels, CC
    COMMUNICATIONS OF THE ACM, 2003, 46 (12) : 325 - 331
  • [50] A Comprehensive Model of Perceived Risk of E-Commerce Transactions
    Glover, Steven
    Benbasat, Izak
    INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2010, 15 (02) : 47 - 78