Properties of secure transaction protocols

نویسندگان

  • Douglas H. Steves
  • Chris Edmondson-Yurkanan
  • Mohamed G. Gouda
چکیده

Communication protocols are the computational basis for distributed electronic commerce systems, and thus the properties of these protocols deene the forms of commerce possible in electronic systems. Existing protocols used for electronic commerce focus primarily on security properties, including message integrity, privacy and non-repudiation, and on basic transaction properties, usually just atomicity; their structural properties are limited to supporting two-party transactions with xed semantics. We believe that the properties provided by these protocols limit their use to simple forms of commerce. In this paper we deene the properties we believe are necessary for electronic commerce protocols. These include the security properties of existing protocols, and extend the transactional properties to include isolation and causality. Causality is a new property for transactions. It allows the order of the messages in a completed transaction to be independently veriied, and thus inferences can be made about causal relationships between messages. We also extend the structural properties to support scalability, layering and separation of roles. Scalable protocols allow several parties to join each transaction. Protocol layering enables arbitrary transaction semantics and greater system modularity. Separation of roles provides independent adjudication of disputes between transaction participants and allows the use of varied exchange media. We term a protocol with the above properties a secure transaction protocol. Lastly, we present a protocol that provides these properties. We believe that this protocol can be used to support more complex and extended forms of electronic commerce than existing protocols.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Verification Logic for Secure Transaction Protocols

In common sense, electronic transactions through secure transaction protocols are secure. However, not all so-called secure transaction protocols are secure. To verify [he protocols this paper proposes the A'DL (nonmonotonic dvnamic logic). .4 novel idea oj jail-negate, namelv non-monotonic, is proposed in :VDL. Thus some securi ZV properties are believed [0 he [rue if 11'e,based on current con...

متن کامل

Multilevel Secure Transaction Processing: Status and Prospects

Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the database research community. Transaction processing in these systems requires modiication of conventional scheduling algorithms and commit protocols. These modiications are necessary because preserving the usual transaction properties when transaction...

متن کامل

Speci cation of Requirements for Payment Transactions in the SET Protocol

Payment transactions in the SET (Secure Electronic Transaction) protocol are described. Requirements for SET are discussed and formally represented in a version of NPATRL (the NRL Protocol Analyzer Temporal Requirements Language). NPATRL is language for expressing generic requirements, heretofore applied to key distribution or key agreement protocols. Transaction vectors and other new construct...

متن کامل

A Formal Specification of Requirements for Payment Transactions in the SET Protocol

Payment transactions in the SET (Secure Electronic Transaction) protocol are described. Requirements for SET are discussed and formally represented in a version of NPATRL (the NRL Protocol Analyzer Temporal Requirements Language). NPATRL is language for expressing generic requirements, heretofore applied to key distribution or key agreement protocols. Transaction vectors and other new construct...

متن کامل

Transaction Properties Proceedings JENC

Communication protocols are the computational basis for distributed electronic commerce systems, and thus the properties of these protocols deene the forms of commerce possible in electronic systems. Existing protocols used for electronic commerce focus primarily on security properties, including message integrity, privacy and non-repudiation, and on basic transaction properties , usually just ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks and ISBN Systems

دوره 29  شماره 

صفحات  -

تاریخ انتشار 1997