Lightweight security primitives for E-commerce

被引:0
|
作者
Matias, Y [1 ]
Mayer, A [1 ]
Silberschatz, A [1 ]
机构
[1] AT&T Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended client-server relationships. For example, consider a web-site (server) which offers repeated authenticated personalized stock quotes to each of its subscribers (clients). The value of a single transaction (e.g., delivery of a web-page with a customized set of quotes) does not warrant the cost of executing a handshake and key distribution protocol. Also, a client might not always use the same machine during such an extended relationship (e.g., a PC at home, a laptop on a trip). Typical transport/session-layer security mechanisms such as SSL and S-HTTP either require handshake/key distribution for each transaction or do not support client mobility. We propose a new security framework for extended relationships between clients and servers, based on persistent shared keys. We argue that this is a preferred model for inexpensive transactions executing within extended relationships. Our main contribution is the design and implementation of a set of lightweight application-layer primitives, for (1) generating and maintaining persistent shared keys without requiring a client to store any information between transactions and (2) securing a wide range of web-transactions (e.g., subscription, authenticated and/or private delivery of information, receipts) with adequate computational cost. Oar protocols require public key infrastructure only for servers/vendors, and its usage only once per client (upon first interaction).
引用
收藏
页码:95 / 102
页数:8
相关论文
共 50 条
  • [21] Research on Pharmaceutical E-commerce and Security
    Xie, Ming
    Liao, Youlian
    ADVANCES IN ASIA-PACIFIC LOW CARBON ECONOMY, 2010, : 493 - 496
  • [22] E-commerce security - it's not an Oxymoron !!
    Blanchfield, Dez
    Telecommunication Journal of Australia, 2000, 50 (04)
  • [23] Piecemeal security threatens e-commerce
    Graham-Rowe, D
    NEW SCIENTIST, 2000, 165 (2231) : 18 - 18
  • [24] DSP application in E-commerce security
    Hu, JK
    Xi, ZP
    Jennings, A
    Lee, HYJ
    Wahyudi, D
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING - VOL IV: SIGNAL PROCESSING FOR COMMUNICATIONS; VOL V: SIGNAL PROCESSING EDUCATION SENSOR ARRAY & MULTICHANNEL SIGNAL PROCESSING AUDIO & ELECTROACOUSTICS; VOL VI: SIGNAL PROCESSING THEORY & METHODS STUDENT FORUM, 2001, : 1005 - 1008
  • [25] On the E-Commerce System Security Audit
    He Zhen
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 2, 2010, : 249 - 254
  • [26] Security and Disturbances in e-Commerce Systems
    Vymetal, Dominik
    Suchanek, Petr
    LIBEREC ECONOMIC FORUM 2011, 2011, : 580 - 589
  • [27] A framework for analyzing e-commerce security
    Kesh, Someswar
    Ramanujan, Sam
    Nerur, Sridhar
    Information Management and Computer Security, 2002, 10 (04): : 149 - 158
  • [28] E-commerce Security: a Technical Survey
    Tian, Zhaofu
    Xu, Ningning
    Peng, Wuliang
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 956 - 960
  • [29] Study on Security Framework in E-Commerce
    Tao, Lu
    Xue, Lei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3541 - 3544
  • [30] Face recognition for e-commerce security
    Wang, W
    Hui, SC
    Gao, Y
    Leung, MKH
    IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 904 - 907