Results 1 -
9 of
9
Architecture of a Micro-payment System for Thin-client Web Applications
- In Proceedings of the 2002 International Conference on Internet Computing, Las Vegas, CSREA
, 2002
"... Some web-based services need to be charged for on a per-use basis, where each usage may be many thousands or even millions per day. Micro-payment is an approach to charging for web content (typically) for situations with a small cost-peruse /high use-frequency. We describe a prototype architecture f ..."
Abstract
-
Cited by 15 (10 self)
- Add to MetaCart
(Show Context)
Some web-based services need to be charged for on a per-use basis, where each usage may be many thousands or even millions per day. Micro-payment is an approach to charging for web content (typically) for situations with a small cost-peruse /high use-frequency. We describe a prototype architecture for a new micro-payment model, called NetPay. We present an object-oriented design and describe a prototype implementation of NetPay for an on-line newspaper. We report on initial evaluation results deploying our NetPay prototype and outline directions for future research in micro-payment implementations.
Architecture for a Component-based, Plug-in Micro-payment System
- Proc 5th AsiaPacific Web Conference, Sept 27-29 2003
, 2003
"... Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of webbased applications. However, adding micro-payment support to web-sites is usually time-consuming and intrusive, both to the web site's software archite ..."
Abstract
-
Cited by 12 (10 self)
- Add to MetaCart
(Show Context)
Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of webbased applications. However, adding micro-payment support to web-sites is usually time-consuming and intrusive, both to the web site's software architecture and its user interface implementation. We describe a plug-in, component model for adding micro-payment support to web applications. We use J2EE software components to encapsulate micro-payment E-coin debiting and redemption and discrete user interface enhancement. A CORBA infrastructure is used to inter-connect J2EE and non-J2EE vendors and micro-payment brokers.
Comparing and contrasting micro-payment models for E-commerce systems
- International Conferences of Info-tech and Info-net (ICII
, 2001
"... Current macro-payment systems used by most E-commerce sites are not suitable for high-volume, low-cost produce or service purpose, such as charging per-page for web site browsing. These payment technologies suffer from use of heavyweight encryption technologies and reliance on always on-line authori ..."
Abstract
-
Cited by 10 (4 self)
- Add to MetaCart
(Show Context)
Current macro-payment systems used by most E-commerce sites are not suitable for high-volume, low-cost produce or service purpose, such as charging per-page for web site browsing. These payment technologies suffer from use of heavyweight encryption technologies and reliance on always on-line authorisation servers. Micro-payment systems offer an alternative strategy of pay-as-you-go charging, even for very low cost, very high-volume charging. However, several different micro-payment schemes exist, not all suitable for all E-commerce uses. We compare and contrast several micropayment models and outline a new micro-payment technology we have been developing.
An agenda for research about the value of payment systems for transactions in electronic commerce
- Journal of Information Technology Theory and Application
"... The growth of electronic commerce (EC) may be impeded because payment systems (PS) designed for offline commerce have been adapted for online use, but without all of the information contained in physical meetings among transaction parties. Resulting problems add costs to transactions and affect prof ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
The growth of electronic commerce (EC) may be impeded because payment systems (PS) designed for offline commerce have been adapted for online use, but without all of the information contained in physical meetings among transaction parties. Resulting problems add costs to transactions and affect profitability for EC transactions. New PS have been developed and are in various stages of theory, development, and rollout, but none have been widely adopted by users. Here we identify eleven generic characteristics of PS and nine of transactions, the interaction of which is expected to affect the cost of completing an online transaction. We use a review of literature, as well as focused group and individual interviews, to develop 35 propositions for how interactions between PS and transaction characteristics affect the transaction costs. Finally, we propose a research agenda to determine the importance of each proposition, the functional form of its impact on cost, and to design effective sets of PS for online transactions.
P2P-NetPay: An Off-line Micro-payment System for Content Sharing in P2P-Networks
"... Abstract — Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We proposed a new model, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer n ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract — Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We proposed a new model, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer network service charging. P2P micro-payment systems must provide a secure, highly efficient, flexible, usable and reliable environment, the key issues in P2P micro-payment systems development. Therefore, in order to assist in the design and implementation of an efficient micro-payment system suitable for P2P networks, we describe a prototype architecture for a new P2P-based micro-payment model based on NetPay micropayment system. We present an object-oriented design and describe a prototype implementation of P2P-NetPay for a file-sharing P2P system. We report on initial evaluation results deploying our P2P-NetPay prototype and outline directions for future research in P2P micro-payment implementations. Index Terms—micro-payment system, software architecture, electronic wallet, P2P-networks I.
unknown title
"... NetPay: An off-line, decentralized micro-payment system for thin-client applications ..."
Abstract
- Add to MetaCart
(Show Context)
NetPay: An off-line, decentralized micro-payment system for thin-client applications
unknown title
"... NetPay: An off-line, decentralized micro-payment system for thin-client applications ..."
Abstract
- Add to MetaCart
(Show Context)
NetPay: An off-line, decentralized micro-payment system for thin-client applications
A Secure and Mutual-Profitable DRM Interoperability Scheme
"... Abstract—In most cases, the use of digital contents on sev-eral devices is blocked by digital rights management (DRM) technology to protect the rights of digital content owners, which is called as the DRM’s walled garden strategy. This strategy has raised many legal, economical, and ethical problems ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—In most cases, the use of digital contents on sev-eral devices is blocked by digital rights management (DRM) technology to protect the rights of digital content owners, which is called as the DRM’s walled garden strategy. This strategy has raised many legal, economical, and ethical problems. DRM interoperability can complement this strategy. However, there is no agreeable systematic interoperability scheme between various DRM systems. This problem cannot be solved without the cooperation and participation of both DRM technology providers and content providers. Some previous attempts to solve the DRM interoperability problem have suggested that both providers need to open parts of their security properties, without the assurance of a beneficial outcome. They were therefore reticent about participating. In this paper, we propose a secure mutual-profitable DRM interoperability scheme which minimizes disclosure of the security properties of DRM technology providers and content providers while preserving their profits. We use a designated proxy re-encryption scheme to allow the providers to designate a proxy which re-encrypts their digital contents and a neutral format scheme to enable format-independent translations. Moreover, we allow the providers to manage and trace their digital contents, and to request additional fees for interoperability services. We describe detailed protocols and analyze the scheme. We also introduce a prototype implementation.
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
"... In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the public key infrastructure (PKI). In this paper, we first discove ..."
Abstract
- Add to MetaCart
(Show Context)
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both symmetric and public-key cryptography independent of the public key infrastructure (PKI). In this paper, we first discover that there exist some weaknesses in EKE protocol that is subjected to imposter attacks based on the analysis result of BAN logic that we apply in EKE protocol. In order to remedy the flaws, we propose an improved scheme—Provable Password-Authenticated Key Exchange (PPAKE) protocol that generates the session key’s timestamp, and verifies the authenticity of public key against imposter attack without online trusted third parties. The proposed protocol is also proven to be secure and trustworthy by BAN logic analysis. In comparison with other schemes, our measurements show that our proposed PPAKE protocol is more safety and requires less computations cost suitable for wireless ad hoc networks.