Development of Transactions Authorization Protocol for Ubiquitous Commerce Systems
نویسندگان
چکیده
Transparency in transactions can only be achieved through a controlled coordination of the real and cyber worlds. The success of Ubiquitous Commerce Systems (UCS) relies on the convergence of both worlds. The mobile devices are ubiquitous; they can be used anytime and anywhere. This poses a lot of security challenges in a ubiquitous society where business transactions will be involved. With the emergence of electronic payment and other business transaction solutions, ubiquity has the potential to make commerce freer and the transaction flows easier. However, privacy, security and mutual trust are critical to its development and use. Hence, for users of UCS services to have full confidence in the system, most especially while operating in a cashless society, absolute security must be put in place by stakeholders. This paper presents a Transactions Authorization Protocol (TAP) for the UCS. TAP is conceptualized to enhance security for UCS users. This protocol is less intrusive and it allows stage by stage authentication before final authorization of the users’ requests.
منابع مشابه
Optimization of majority protocol for controlling transactions concurrency in distributed databases by multi-agent systems
In this paper, we propose a new concurrency control algorithm based on multi-agent systems which is an extension of majority protocol. Then, we suggest a clustering approach to get better results in reliability, decreasing message passing and algorithm’s runtime. Here, we consider n different transactions working on non-conflict data items. Considering execution efficiency of some different...
متن کاملAuthentication tests and disjoint encryption: A design method for security protocols
We describe a protocol design process, and illustrate its use by creating atspect, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design process is organized around the authentication tests, a method for protocol verification based on the strand space theory. The authentication tests dictate how randomly generated values such as nonces may be combined wit...
متن کاملSqueezing the Authorization Problem Through a Shrinking Window for Requirements
Information system deployment is squeezed by a shrinking commitment to requirements definition and an expanding need to determine the security requirements of such systems, due to the emphasis on internet access, online transactions, and workflow. This paper investigates the causes and effects of this squeeze. For the users of engineering information systems, the most important aspect of securi...
متن کاملIdentity verification based on certificateless public key cryptography
Verification of claimed identity becomes a problem of growing significance nowadays, as the number of e-commerce transactions grows rapidly and new information distribution channels are created by companies and institutions of all kinds. As most of them rely or make a use of a public network, such as the Internet, security of transferred data and information in most cases requires authorization...
متن کاملAuthorization Requirements on a Budget
Engineering information system deployment is squeezed by a shrinking commitment to requirements definition and an expanding need to determine the security requirements of such systems. This paper examines the causes and effects of this squeeze. Commitment is shrinking because of past requirements experiences, misunderstood trends in system development, and requirements fatigue, while needs are ...
متن کامل