期刊文献+

基于可信第三方的安全支付认证模型及其应用 被引量:5

Research on payment authentication model based on trusted third party
下载PDF
导出
摘要 针对3D(3 Domain)安全协议,对电子交易中敏感隐私信息保护不足的缺点进行了改进,引入了支付认证交易码、支付认证校验码和安全工作流,使3D安全协议中的3 个域能在保护敏感信息隐私的前提下安全交易,并构建了基于可信第三方的B2C安全支付认证模型。该模型给出了结合访问控制策略和可扩展标记语言安全技术的设计实例,表明改进的3D SET协议能保障交易中各参与者彼此间的信息隐私,并能适应更复杂的流程管理,更大程度地降低在线购买的风险,进而提高采用在线支付方式的意愿。 An improved Three Domain (3D) secure protocol and payment authentication model was proposed to guarantee Business-to-Customer (B2C) transactions based on Trusted Third Party (TTP). Payment Authentication Transaction Value (PATV), Payment Authentication Verification Value (PAVV) and secure workflow were introduced to improve the security of 3D secure protocol. Transactions could be safely performed without disclosure of sensitive privacy information among the members in 3D SET. Furthermore, the application of the model, which was integrated with the improved secure protocol, XML security and secure workflow technology, was presented. It was exemplified that the proposed 3D SET solution was designed to protect privacy information, to reduce perceived risk more, and additionally to adapt to more complicated e-Commerce flows. Hence, the work leads to positive intentions towards adoption of online payment.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2005年第5期690-695,726,共7页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金资助项目(70372011) 国家十五科技攻关计划专题资助项目(2001BA102A06- 09)~~
关键词 可信第三方 隐私 支付认证 工作流 访问控制策略 trusted third party privacy payment authentication workflow access control policy
  • 相关文献

参考文献15

  • 1RANGANATHAN C, GANAPATHY A. Key dimensions of business-to-customer web sites[J]. Information and Management, 2002, 39(1) :457-465.
  • 2Visa International Service Association. 3- D secure protocal specification core functions[EB/OL], http://international, visa. com/fb/paytech/secure/main, jsp,2004- 01- 07.
  • 3HWANG J J,YEH T C, LI J B. Securing on-line credit card payments without disclosing privacy information[J]. Computer Standards & Interfaces, 2003, 25(2):119-129.
  • 4KRUGTEN van P, HOOGENBOOM M. B2C security-be just secure enough, computers & security[J]. 2000, 19(4):348-356.
  • 5PORTILLO E, PATEL A. Design methodology for secure distributed transactions in electronic commerce [J]. Computer Standards & Interfaces, 1999, 21(3):5-18.
  • 6CHANG J, CHOI B, LEE H. An organizational memory for facilitating knowledge: an application to e-business architecture[J]. Expert Systems with Applications, 2004, 26(9):203-215.
  • 7RICCI A, OMICINI A, DENTI E. Virtual enterprises and workflow management as agent coordination issues[J]. International Journal of Cooperative Information Systems, 2002, 11(3):355-379.
  • 8BLAKE M B. Agent-based communication for distributed workflow management using JINI technologies [J]. International Journal on Artificial Intelligence Tools, 2003,12(1):81-99.
  • 9WU Xiaoqiang. A hybrid approach in intelligent workflow modeling using Petri nets and neural network for inter-organizational cooperation[A]. Proceedings of The Eighth International Conference on Computer Supported Cooperative Work in Design[C]. Xiamen, China: IEEE Press, 2004. 307-311.
  • 10WU Xiaoqiang, QIU Wanhua. The research on intelligent neural extended Petri nets workflow model for inter- organizational collaboration[J]. System Engineer, 2004,22 (S):55-61.

同被引文献19

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部