Design methodology for secure distributed transactions in electronic commerce

Computer Standards & Interfaces - Tập 21 - Trang 5-18 - 1999
Eloy Portillo1, Ahmed Patel1
1Computer Networks and Distributed Systems Research Group, Department of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland

Tài liệu tham khảo

S. Gritzalis, et al., KEYSTONE. European Cross Domain PKI Architecture. User Requirement Report. INFOSEC Programme Keystone Project (INFOSEC) Deliverable 1.1 Univ. of Aegean, Athens, Abr. 1998. ABS Broker Business Model, ACTS ABS Project Deliverable 2.3, 1996. Generic and domain requirements statement, ACTS GAIA Deliverable 0301, 1996. ACTS Multimediator deliverable D12, 1997. OSM Broker, Banker, Dealmaker (Consolidated Analysis), OSM Deliverable 6, 1997. Boehm, 1988, A spiral model of software development and enhancement, Computer, 21, 61, 10.1109/2.59 CCTA Risk Analysis and Management Method: User Manual Ver. 3.0. UK Central Computer and Telecommunication Agency, HMSO, 1996. H.A. Linsto (Ed.), The Delphi Method: Techniques and Applications, Addison-Wesley, 1975. ISO/IEC IS 10746 | ITU-T X.900 Rec. Series Information Processing Systems—Open Distributed Processing—Basic Reference Model, Geneva, Switzerland, 1996. K. Ishikawa, What is Total Quality Control?: The Japanese Way, Prentice-Hall, London, UK, 1985. E. Portillo, J. Carracedo, Seguridad en redes complejas: el caso Internet, in: Proceedings of I Congreso de la Asociación de Usuarios Internet, Madrid, Spain, 1996 (in Spanish). F. Sáez-Vacas, Facing informatics via three-level complexity views, in: G.E. Lasker (Ed.), Proceedings of the 10th International Congress on Cybernetics, International Association of Cybernetics, Namur, 1983. R. Holbein, S. Teufel, K. Baucknecht, The Use of Business Process Models for Security design in Organisations, in: S.K. Katsikas, D. Gritzalis (Eds.), Information Systems Security. Facing the Information Society of the 21st Century. Selected Contributions of the IFIP SEC'96, Chapman & Hall, London, 1996. T. Jackson, The golden code of e-commerce, Financial Times (11 May 1998) p. 14 . G. Coulouris, J. Dollimore, T. Kindberg, Distributed Systems. Concepts and Design. Addison-Wesley, UK (1994). ISO/IEC IS 10026, Information Technology—Open Systems Interconnection—Distributed Transaction Processing Geneva, Switzerland, 1997. ISO SC21 WG3 CD 14447, TP Security. Annex: Framework for distributed commitment in electronic commerce (Working Draft), 1997. SET Secure Electronic Transaction LLC SET, Secure Electronic Transaction Specification. Book 1: Business Description. Version 1.0, May 1997. Sinnot, 1997, Applying the architectural semantics of ODP to develop a trader specification, Computer Networks and ISDN Systems, 29, 457, 10.1016/S0169-7552(96)00108-0 Chaum, 1985, Security without identification: Card Computers to make Big Brother obsolete, Communications of the ACM, 28, 1030, 10.1145/4372.4373 ISO/IEC IS 7498-2 Information Processing Systems—Open Systems Interconnection—Basic Reference Model—Part 2: Security, Structure and Applications, Geneva, Switzerland, 1991 (technically aligned with ITU-T X.800 Rec., 1992). D.J. Berlinski, On System Analysis, The MIT Press, Cambridge, MA, USA, 1976. G. Vickers, The Art of Judgement, Chapman & Hall, London, 1965 (Reprinted Harper and Row, London, 1983). P.B. Checkland, J. Scholes, Soft Systems Methodology in Action, Wiley, New York, 1990. J. Galvin, K. McCloghrie, Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2). RFC 1195. IETF, Apr. 1993. NCSC-TG-005 Trusted Network Interpretation (TNI) of the Trusted Computer System Evaluation Criteria (TCSEC) Version 1, NCSC, 1987 (usually known as The Red Book).