期刊文献+

一种基于RBAC的电子商务匿名性与可追究性实现方案 被引量:3

A RBAC Based E-commerce Solution for Anonymity and Accountability
下载PDF
导出
摘要 提出了一种基于RBAC思想对可信第三方功能进行分类并结合其他一些技术实现电子商务中匿名性与可追究性的解决方案,主要涉及三个主要过程:用户的注册控制、交易过程的控制及投诉处理过程。通过对注册用户的信息进行加密并对加密密钥进行分割保存来实现匿名性,通过对交易过程安全协议的设计及TTP功能的划分达到可追究性要求,并对可追究性的实现给予证明。 A resolution for anonymity and accountability requirement in E-commerce is proposed which bases on the thought of BRAC and implicates some other skills. There are three main processes., user's registration, process of trade, and the resolution of complaint. Anonymity of this solution is realized by encryption of the private information of user and the way to save the key in which the key is divided and saved in different places, Accountability is realized by the design of secure protocol and the division of power of the TTP, and the provision of accountability is also given.
出处 《计算机科学》 CSCD 北大核心 2007年第7期86-89,共4页 Computer Science
基金 北京市自然科学基金(批准号:4052016) 国家自然科学基金(批准号:60573042) 国家重点基础研究发展规划(973)(批准号:G1999035802)
关键词 RBAC 电子商务 匿名性 可追究行 安全协议 RBAC, E-commerce, Anonymity, Accountability, Secure protocol
  • 相关文献

参考文献2

二级参考文献15

  • 1卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300~1309.http://www.jos.org.cn/1000-9825/14/1300.htm.,.
  • 2卿斯汉.安全协议20年研究进展.软件学报, 2003,14(10):1740~1752.http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 3ISO/IEC 3rd CD 13888-1. Information technology-Security techniques Part 1: General model. ISO/IEC JTC11/SC24 N1274, 1996.
  • 4Burrows M, Abadi M, Needham R. A logic of authentication. ACM Transactions on Computer Systems, 1990,8(1):18-36.
  • 5Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 1996,22(5):313-328.
  • 6Coffey T, Saidha P. Non-Repudiation with mandatory proof of receipt. Computer Communication Review, 1996,26(1):6- 17.
  • 7Deng RH, Gong L, Lazar AA, Wang W. Practical protocols for certified electronic mail. Journal of Network and Systems Management, 1996,4(3):279-297.
  • 8Asokan N, Shoup V, Waidner M. Asynchronous protocols for optimistic fair exchange. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 86-99.
  • 9卿斯汉.安全协议20年研究进展.软件学报,2003,14(10):1740-1752[EB/OL].http://www.jos.org.cn/1000-9825/14/1740.htm.,.
  • 10卿斯汉.安全协议的设计与逻辑分析.软件学报,2003,14(7):1300-1309[EB/OL].http://www.jos.org.cn/1000-9825/14/1300.htm.,.

共引文献95

同被引文献16

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部