PKIs for Mobile Commerce

نویسنده

  • Gang Lian
چکیده

Public -key cryptography is a key technology for e-commerce, Intranets, extranets and other webenabled applications that require security and authentication in an open network. However, to earn the benefits of public-key cryptography, a supporting public -key infrastructure is needed to publish and manage public-keys. Without a functioning infrastructure, public-key cryptography is just the one of optional algorithms for encryption as the traditional secret-key cryptography, nothing more. This seminar paper describes the fundamental characteristics and operations of public-key security systems, which are common to all PKI system, and also including what benefits they offer and what components are required to implement them. According to those characteristics, especially trust model and certificate revocation, the paper later also describes how the different PKI systems deal with those issues, as a sequence, those criteria will reveal the strengths and weaknesses of each system, and then indicate What is the new trend.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bridge Certification Authorities: Connecting B2B Public Key Infrastructures

Businesses are deploying Public Key Infrastructures (PKIs) to support internal business processes, implement virtual private networks, and secure corporate assets. In addition, most businesses have industrial partnerships with other businesses for economic reasons. If these industrial alliances wish to exploit their internal security capabilities for businessto-business (B2B) electronic commerc...

متن کامل

Authorization Methods for E-Commerce Applications

In the recent past, a lot of work has been done in establishing public key infrastructures (PKIs) for electronic commerce (e-commerce) applications. Unfortunately, most of these PKIs can only be used to authenticate the participants of e-commerce applications; they can't be used to properly authorize the participants and to control access to system resources accordingly. Consequently, these PKI...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

پژوهشی در تأثیرگذاری ارزش پیشنهادی حوزه واسط مشتری، جهت طراحی مدل کسب و کار همراه با رویکرد BMO

Mobile commerce business models will be beneficial for customers if the proposed services include service usage at any location, ability to localize/personalize and comfort in using services. The objective of this research is to explain mobile commerce and design business model in customer interface and product using Osterwalder business model anthology. Hence, this research aims to design and ...

متن کامل

Towards a Flexible Access Control Mechanism for E-Transactions

Security over the Internet depends on a clear distinction between authorized and un-authorized principals. Discriminating between the two involves: identification (user identifies himself/herself), authentication (the system validates the user’s identity) and authorization (specific rights granted). Thus, it is important to develop specifications for access control that realize the above proper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000