Secure Coprocessors in Electronic Commerce Applications
نویسنده
چکیده
Many researchers believe electronic wallets (secure storage devices that maintain account balances) are the solution to electronic commerce challenges. This paper argues for a more powerful model — a secure coprocessor — that can run a small operating system, run application programs, and also keep secure storage for cryptographic keys and balance information. We have built a system called Dyad, on top of a port of the Mach 3.0 microkernel to the IBM Citadel secure coprocessor. This paper describes the abstract architecture of Dyad and a general discussion of secure coprocessor implementations of a variety of electronic commerce ap-
منابع مشابه
Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors
Secure coprocessors provide a foundation for many exciting electronic commerce applications, as previous work [20, 21] has demonstrated. As our recent work [6, 13, 14] has explored, building a high-end secure coprocessor that can be easily programmed and deployed by a wide range of third parties can be an important step toward realizing this promise. But this step requires trusting trusted hard...
متن کاملEnabling a Lightweight Software Agent Framework for Secure Agent-based Electronic Commerce Applications
Although electronic commerce is a relatively new concept, it has already become a normal aspect of our daily life. The software agent technology is also relatively new. In the area of electronic commerce, software agents could be used for example to search the lowest prices and the best services, to buy goods on behalf of a user, etc. These applications involve a number of security issues that ...
متن کاملA robust e-commerce service: Light-weight secure mail-order mechanism
22 23 24 25 26 27 28 29 Article history: Received 16 September 2011 Received in revised form 30 March 2012 Accepted 3 April 2012 Available online xxxx
متن کاملSymbolon - A Novel Concept For Secure e-Commerce
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated security mechanisms and intuitive usability so customers put trust in them and therefore use EBAs. Although EBAs have been existing for a long time and their concepts are well understood, current EBAs have severe security a...
متن کاملStudy on the application layer security in E-Commerce websites
Most of studies about E-Commerce Security focus on the data confidentiality issue. Although security mechanisms, such as SSL (secure socket layer) or SET (secure electronic transaction), have been adopted in websites, catastrophic events that confidential data in ECommerce are revealed happened more than once. The essential reason for this is that there exist potential security vulnerabilities ...
متن کامل