期刊文献+

在NetBill交易协议中引入对商家的时限责任的追究 被引量:1

Introducing Temporal Accountability to the Merchant in the NetBill Transaction Protocol
在线阅读 下载PDF
导出
摘要 NetBill电子交易系统是一个用于网上信息商品以及可通过网络发送的服务的微交易系统。本文从时限责任的角度指出了NetBill交易协议中存在的一种商家欺骗行为,并通过在NetBill交易协议中引入受信任的时间戳服务器的方法,使得修改后的NetBill交易协议能够支持对商家的时限责任的追究。最后本文采用时限逻辑证明了修改后的NetBill协议满足期望的时限属性。 NetBill is a micropayment system for information goods and services on the Internet. This paper points out a merchant fraud in the NetBill protocol from the temporal accountability view, and fixs the problem by introducing a timestamp server into the NetBill system. By using a temporal logic, this paper also proves that the modified NetBill system has the ability to hold the merchant's temporal accountability.
出处 《计算机科学》 CSCD 北大核心 2004年第10期79-83,共5页 Computer Science
基金 广西自然科学基金(0229051)
关键词 电子交易系统 商家 责任 协议 商品 服务器 时限 时间戳 发送 属性 NetBill protocol, Temporal accountability, Timestamp server
  • 相关文献

参考文献11

  • 1Sirbu M, Tygar J D. NetBill: an internet commerce system optimized for network delivered services [J]. IEEE Personal Communications, 1995, 2(4): 34 - 39
  • 2Cox B, Tygar J D, Sirbu M. NetBill Security aud Transaction Protocol. In:Proc. of the First USENIX Workshop on Electronic Commerce,July 1995.77-88
  • 3Tygar J D. Atomicity in Electronic Commerce, ACM-Mixed Media, April 1998
  • 4Heintze N, Tygar J D, Wing J, Wong H C. Model checking electronic commerce protocols. In:Proc. USENIX 1996 Workshop on Electronic Commerce, Nov. 1996
  • 5Lichota R W, Hammonds G L, Brackin S H. Verifying Cryptographic Protocols for Electronic Commerce. In: Proc. of the 2nd USENIX Workshop on Electronic Commerce, 1996.53-65
  • 6Kailar R. Accountability in electronic commerce protocols [J].IEEE Trans. on Software Engineering, 1996,22(5): 313-328
  • 7Syverson P. Adding time to a logic of authentication [A]. In:Proc. of the 1st ACM Conf. on Computer and Communications Security [C]. Fair-fax:ACM,1993.97-101
  • 8Burrows M, Abadi M, Needham R M. A logic of authentication. Report. 39[R]. Palo Alto ,CA:DEC System Research Center,1989
  • 9Abadi M, Tuttle M R. A semantics for a logic of authentication [A]. In: Proc. of the 10th Annual ACM Symposium on Principles of Distributed Computing [C]. 1991. 201-216
  • 10Kudo M. Electronic submission protocol based on temporal accountability [A]. In: Proc. of 14th Annual Computer Security Application Conf. [C]. Phoenix: ACSA,1998. 353-363

同被引文献11

  • 1冯涛,余冬梅,边培泉.NetBill协议的形式化描述及分析[J].兰州理工大学学报,2004,30(4):102-105. 被引量:2
  • 2薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:62
  • 3Lu S M,Zhang J L, Luo L M.The automatic verifica- tion and improvement of SET protocol model with SMV[C]//Proceedings of the International Symposium on Information Engineering and Electronic Commerce ( IEEC' 09), Ternopil, 2009 : 433-436.
  • 4Panti M, Spalazzi L, Tacconi S, et al.Automatic verifica- tion of security in payment protocols for electronic commerce[C]//Proceedings of the 4th International Confer- ence on Enterprise Information Systems,2002:968-974.
  • 5Giampaolo B, Fabio M, Paulson L C.An overview of the verification of SET[J].International Journal of Infor- mation Security ,2005,4(1/2) : 17-28.
  • 6Syverson P F, Vanoorscho P C.An unified cryptographic protocol logic[R].Washington:Naval Research Lab, 1996.
  • 7Cox B,Tygar J D.Netbill security and transaction pro- tocol[C]//Proceedings of the 1st USF.NIX Workshop on Electronic Commerce, 1995 : 77-88.
  • 8Burrows M,Abadi M,Needham R.A logic of authenti- cation[J].ACM Transactions on Computer Systems, 1990, 8(1): 18-36.
  • 9肖茵茵,苏开乐,岳伟亚,陈清亮,吕关锋,杨晋吉.SET证书申请协议在SPV下的自动化验证及改进[J].计算机学报,2008,31(6):1035-1045. 被引量:3
  • 10缪力,谭志华,张大方.基于SPIN的网络认证协议高效模型检测[J].计算机工程与应用,2012,48(21):62-67. 被引量:4

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部