Atjaunināt sīkdatņu piekrišanu

E-grāmata: SEMPER - Secure Electronic Marketplace for Europe

Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 1854
  • Izdošanas datums: 24-May-2004
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540449270
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 1854
  • Izdošanas datums: 24-May-2004
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540449270

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Some years ago, businesses could choose whether to migrate to electronic commerce, however, today it seems they have no choice. Predictions indicate that companies that do not make the necessary changes will be overrun by competition and ultimately fail. Therefore, we see more and more companies undergoing tremendous transformationin order to adapt to the new business paradigm. At the same time new companies are being established. One thing these companies have in common is the increased dependency on security technology. The invention of electronic commerce has changed the role of - curity technologies from being merely a protector to being also an enabler of electronic commerce, and it is clear that the development of security techn- ogy is a key enabler in the growth and deployment of electronic commerce. This has been recognised at European level (European Union 1997e). The launch of a comprehensive EU policy in the area of security in open networksisfairlyrecentwiththeadoptionofaCommunicationoncryptog- phy inOctober 1997(EuropeanUnion1997c). A veryimportantcomplement and support to the European policy is the European Commission’s contri- tion to overcometechnological barriers by giving special importance to R&D (Research and Development) activities. The SEMPER project was launched in September 1995 and was funded partly by the European Community within the Advanced Communication Technologies and Services (ACTS) speci c research programme part of the Fourth Framework Program (1994-1998). In this book the SEMPER project team presents in a coherent, integrated, and readable form the issues - dressed,themotivationfortheworkcarriedout,andthekeyresultsobtained. SEMPER is an innovative project in several aspects.

Papildus informācija

Springer Book Archives
Part I. The Vision of SEMPER
Secure Electronic Commerce
3(12)
The Notion of ``Electronic Commerce''
3(3)
Shopping over the Internet
3(2)
Business-to-Business Commerce
5(1)
What's Special about Electronic Commerce?
6(2)
Virtuality of Electronic Commerce
6(1)
The Internet as a Hostile Environment
6(1)
Insecure User Equipment
7(1)
New Opportunities to Commit Fraud
8(1)
Existing Approaches to Secure Electronic Commerce
8(3)
Secure Channels
8(1)
Trusted Market Provider
9(1)
Digital Signatures and Public-Key Infrastructures
10(1)
Payment Systems
11(1)
The Whole Picture of Electronic Commerce
11(2)
Resulting Goals of SEMPER
13(2)
Security Requirements
13(1)
The SEMPER Focus
13(2)
Technical Framework
15(8)
The SEMPER Model
15(2)
Approach
17(1)
Architecture
18(3)
Protocols and Implementation
21(2)
Legal Framework
23(8)
Introduction
23(1)
Predictable Liability for Signature Keys
24(3)
Commitments without Online Third Party
25(1)
Liability-Cover Service
25(1)
Security and Market Effectiveness
26(1)
The SEMPER Electronic-Commerce Agreement
27(2)
Structure of SECA
27(1)
Introducing Electronic-Commerce Agreements
28(1)
Conclusions
29(2)
Vision of Future Products
31(10)
Four Facets of SEMPER as a Product
31(2)
SEMPER-based Business Applications
33(4)
Secure Internet Shopping
33(1)
Person-to-Person Scenario: The Fair Internet Trader
34(3)
Outlook
37(4)
Part II. Project Achievements
Organizational Overview
41(4)
Structure of SEMPER
41(1)
Lessons Learned
42(3)
Initial Education
42(1)
Common Understanding
42(1)
Teams of Individuals, not Organizations
42(3)
Architecture
45(20)
Important Concepts
45(4)
The Model of Deals, Transfers, and Exchanges
45(1)
Global Security Concepts
46(2)
Security Attributes
48(1)
Transactions, Sessions, Contexts
48(1)
Service Architecture
49(9)
Business Applications
49(2)
Commerce Layer
51(1)
Transfer-and-Exchange Layer
52(2)
Business-Item Layer
54(1)
Supporting Services
55(3)
Implementation Architecture
58(3)
Structure of a Block: Manager-Module Concept
58(2)
Communication
60(1)
Business Applications and Browser Integration
61(1)
Prototype
61(1)
Outlook
62(3)
Experiments
65(30)
Introduction
65(1)
Trial Sites and Services
66(8)
Internal SEMPER Trials
68(1)
Freiburg Basic Trial
69(1)
SME Trials
70(4)
Freiburg SME Trial
74(1)
MOMENTS Trial
74(1)
Trial Implementations
74(3)
Trial Services
75(1)
Equipment and Set-Up
76(1)
SME Business Applications
77(1)
MOMENTS Trial
77(1)
Trial Participants' Reactions
77(8)
Initializing the SEMPER Software
78(2)
Purse Creation and Management/Payment Options
80(2)
TINGUIN (Trustworthy User Interface)
82(2)
Secure Identification and Document Exchange
84(1)
Service Providers' Reaction
85(6)
Conclusion
91(4)
The Fair Internet Trader
95(26)
Vision of a Person-to-Person Electronic-Commerce Tool
95(2)
A New Type of Electronic Commerce
95(1)
The Role of a Tool
96(1)
The FIT from a User Perspective
97(9)
Overview
98(1)
Negotiation Stage
98(4)
Contract Signing Stage
102(1)
Fulfillment Stage
103(2)
Disputes
105(1)
Internal Design
106(7)
Overview
106(2)
The Messages Subsystem
108(1)
The Display Subsystem
108(1)
The Flow Subsystem
109(2)
Execution Model
111(2)
Experiments
113(6)
Outlook
119(2)
The Commerce Layer: A Framework for Commercial Transactions
121(34)
Technical Approach
121(3)
The Challenge
121(1)
The Generic Deal Approach
122(2)
Concepts and Architecture
124(12)
The Commerce-Transaction Service Model
124(2)
Trust Relations
126(1)
Commerce Transaction
127(1)
Commerce Deal
127(2)
The Commerce Service API Access Control
129(1)
Authorization of Commerce Transactions
130(5)
Service Quality Management
135(1)
Design Overview
136(12)
The Commerce-Layer Use Cases
136(3)
Class Diagram
139(2)
Commerce Transactions
141(1)
Representation of a Commerce Transaction
141(1)
The Downloader
141(5)
Scenarios
146(2)
Using the Commerce Transaction Service
148(7)
Case Description
149(1)
Definition of Transaction Classes
149(2)
Activation of a Deal
151(1)
Inspection of a Deal
152(1)
Commerce Transactions
152(3)
Fair Exchange: A New Paradigm for Electronic Commerce
155(30)
Introduction and Overview
155(4)
Why ``Generic'' Fair Exchange?
156(2)
Overview
158(1)
Notation and Assumptions
158(1)
Related Work
159(3)
Certified Mail
159(1)
Contract Signing
160(1)
Fair Purchase
161(1)
Using Transfers and Fair Exchanges
162(2)
Transfers of Basic Business Items
163(1)
Fair Exchange
163(1)
A Model of Transfers Enabling Fair Exchange
164(6)
External Verifiability
164(2)
Generatability
166(2)
Revocability
168(1)
Examples
169(1)
Transfer-based Generic Fair Exchange
170(3)
Exchanging Externally Verifiable and Generatable Items
170(2)
Exchanging Externally Verifiable and Revocable Items
172(1)
Efficiency
172(1)
The SEMPER Fair-Exchange Framework
173(12)
Class Hierarchy
174(4)
The Transfer-and-Exchange Framework in Action
178(4)
Extending the Transfer-and-Exchange Layer
182(3)
The Payment Framework
185(28)
Introduction
185(2)
Models of Electronic Payment Systems
187(2)
Players
187(1)
Payment Models
188(1)
Design of the Framework
189(9)
Scope
189(2)
Functional Architecture
191(1)
Design Overview
192(4)
Purses
196(1)
Transactions and Transaction Records
196(1)
Payment Manager
197(1)
Adapting a Payment System
198(1)
Using the Generic Payment Service Framework
198(3)
Payment Transactions
198(1)
Special Application Functionality
199(2)
Token-based Interface Definition
201(2)
Extending the Design
203(6)
Dispute Management
203(3)
Payment Security Policies
206(3)
Related Work
209(2)
Summary
211(2)
Trust Management in the Certificate Block
213(20)
Public-Key Infrastructure
213(3)
The Need for Trust Management
216(4)
Specifying Trusted CAs and Acceptable Certificates
218(1)
Selecting Certificates Automatically in a Business Session
218(2)
Design of Policy Management
220(3)
Maintaining Information about Policies
220(1)
Using Policies
220(2)
Negotiation of Certificates
222(1)
Prototype Implementation
223(7)
Public-Key Infrastructure in the SEMPER Trials
223(2)
Trust Management
225(5)
Related Work
230(3)
Netscape Communicator
230(1)
Microsoft Internet Explorer
231(1)
PolicyMaker
232(1)
Limiting Liability in Electronic Commerce
233(24)
Introduction
233(7)
Necessity to Limit Liability
233(4)
Separation Between Digital Signature and Undeniable Commitment
237(2)
Principles and Achievements of the Solution Proposed
239(1)
Description of the Commitment Service
240(7)
What Exactly is an Undeniable Commitment?
241(1)
Initialization of the Subscriber
242(1)
Key Certificate
243(1)
Key Revocation
244(1)
Commitment Request and Response
244(2)
Validity of the Commitment Certificates
246(1)
Using the Commitment Service as Liability-Cover Service
246(1)
Integration in a Legal Framework
247(1)
Possible Variants and Supplements
247(5)
Limits
248(1)
Message Flow
248(1)
Combination with ``Solvency Service''
249(1)
Recharging Liabilities
249(1)
Several Relying Parties or Beneficiaries
250(1)
Other Kinds of Authorization and Issuance of Commitment Certificates
251(1)
Who is Liable for Failures at the CCA?
252(1)
Conclusions
253(4)
Reasons for Merchants to Use the Commitment Service
253(1)
Chambers of Commerce to Provide the Commitment Service?
254(1)
Reasons for Buyers to Use the Commitment Service
254(3)
Legal Aspects
257(48)
Introduction
257(1)
Legal Issues in Electronic Commerce
258(12)
Applicable Law and Jurisdiction
259(1)
Electronic Authentication---Validity of Digital Signatures
260(1)
Proof of Digital Signatures
260(2)
Regulations for Use and Export of Dual-Use Goods
262(1)
Consumer-Protection Laws
263(1)
Privacy and Data Protection
263(1)
Advertising, Competition, Spamming
264(1)
Content of Contracts and Internet Pages
265(1)
Contract Law
266(1)
Copyright and Trademark
267(2)
Payment
269(1)
Taxation
270(1)
Conclusions
270(1)
Selected Approaches at Legal Frameworks
270(9)
UNCITRAL Model Law on Electronic Commerce
271(2)
Approach of the Commission of the European Community (CEC)
273(2)
OECD Guidelines
275(1)
Utah Digital Signature Act (1996)
276(1)
German Digital Signature Act (1997)
277(1)
Electronic Data Interchange Agreements
278(1)
Conclusions
279(1)
The SEMPER Electronic-Commerce Agreement
279(8)
General
279(1)
SECA CAs
280(1)
SECA Legal Body
281(1)
Joining SECA
281(1)
Liability Limits in SECA
282(2)
Blacklists of Players Claiming Compromised Keys and Signatures
284(2)
Levels of Equipment
286(1)
The Content of SECA
287(16)
The Agreement
287(5)
The Code of Conduct
292(2)
The Guidelines
294(9)
Conclusions
303(2)
Future Directions in Secure Electronic Commerce
305(20)
Non-technical Issues
305(2)
Security Awareness
305(1)
Crypto Regulations
306(1)
Legal Issues
307(1)
Global Technical Issues
307(8)
Process Orientation
307(1)
Dispute Handling
308(1)
Access Control
309(1)
Pervasive Anonymity
310(2)
Web Tracking, Personalized Accounts, and Directed Marketing
312(1)
Multi-party Protocols
312(1)
Visualization of Security
313(2)
Services and Protocols
315(5)
Business-Item Layer
315(2)
Supporting Services
317(3)
Implementation
320(5)
Trusted Computing Base
320(1)
Dependable Third-Party Implementations
321(1)
Assurance
322(3)
References 325(10)
Glossary 335(8)
Index 343