• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Maintaining Privacy in Electronic Transactions (1994)

by B T H Cox
Add To MetaCart

Tools

Sorted by:
Results 1 - 9 of 9

NetBill security and transaction protocol

by Benjamin Cox, J. D. Tygar, Marvin Sirbu - In first USENIX workshop on Electronic Commerce , 1995
"... NetBill is a system for micropayments for information goods on the Internet. This paper presents the NetBill protocol and describes its security and transactional features. Among our key innovations are: • An atomic certified delivery method so that a customer pays if and only if she receives her in ..."
Abstract - Cited by 130 (6 self) - Add to MetaCart
NetBill is a system for micropayments for information goods on the Internet. This paper presents the NetBill protocol and describes its security and transactional features. Among our key innovations are: • An atomic certified delivery method so that a customer pays if and only if she receives her information goods intact. • Outsourcing access control: different users can use different access control servers. • A credential mechanism allowing users to prove membership in groups. This supports discounts. • A structure for constructing pseudonyms to protect the identities of consumers.
(Show Context)

Citation Context

...cy of the customer's identity: a per-transaction method that uses a unique pseudonym for each transaction, and a per-merchant method that uses a unique pseudonym for each customer-merchant pair. (See =-=[3]-=- for a full discussion of privacy protection with pseudonyms.) The per-merchant pseudonym is useful for customers who wish to maintain a consistent pseudonymous identity to qualify for frequent-buyer ...

Atomicity in ELectronic Commerce

by J. D. Tygar - IN ASIAN 1996, LECTURE NOTES IN COMPUTER SCIENCE 1179 , 1996
"... There is tremendous demand for the ability to be able to electronically buy and sell goods over networks. This field is called electronic commerce, and it has inspired a large variety of work. Unfortunately, much of that work ignores traditional transaction processing concerns — chiefly atomicity. T ..."
Abstract - Cited by 68 (5 self) - Add to MetaCart
There is tremendous demand for the ability to be able to electronically buy and sell goods over networks. This field is called electronic commerce, and it has inspired a large variety of work. Unfortunately, much of that work ignores traditional transaction processing concerns — chiefly atomicity. This paper discusses the role of atomicity in electronic commerce. It then briefly surveys some major types of electronic commerce pointing out flaws in atomicity. We pay special attention to the atomicity problems of proposals for digital cash. The paper present two examples of highly atomic

Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce

by J. D. Tygar - In Proceedings of the 24 th Conference on Very Large Databases (VLDB'98 , 1998
"... Electronic commerce challenges our notions of distributed transactions in several ways. I discuss issues how distributed transactions can apply to electronic transactions, with special emphasis on the role of ..."
Abstract - Cited by 21 (0 self) - Add to MetaCart
Electronic commerce challenges our notions of distributed transactions in several ways. I discuss issues how distributed transactions can apply to electronic transactions, with special emphasis on the role of

Token and Notational Money in Electronic Commerce

by L. Jean Camp, Marvin Sirbu, J. D. Tygar, L. Jean, Camp Marvin, Sirbu J. D. Tygar , 1995
"... What properties of money are important for electronic commerce? We argue that both transactional and privacy properties distinguish electronic commerce systems. We provide a quick overview of the history of money. We then consider privacy provided by different forms of money, and socially desirable ..."
Abstract - Cited by 16 (5 self) - Add to MetaCart
What properties of money are important for electronic commerce? We argue that both transactional and privacy properties distinguish electronic commerce systems. We provide a quick overview of the history of money. We then consider privacy provided by different forms of money, and socially desirable disclosure of information as specified by legal reporting requirements. We classify electronic and traditional commerce systems into two categories: . token systems, which exchange markers representing value . notational systems, where value is stored as notations in a ledger or computer. We analyze different forms of traditional money based on the degree to which they protect the privacy and preserve transactional ACID (atomicity, consistency, isolation, durability) properties. Finally we apply our evaluation criteria to two proposed electronic commerce systems: Digicash, (Chaum, 1985; Chaum, 1992) a token-based system; and NetBill, (Sirbu, 1995) a notational system. 1 Token and Notational...
(Show Context)

Citation Context

...e transmitted through agents , which encrypt the origin of the message and then send it forward to the seller. The seller delivers the requested good through the agent. This is described in Figure 3 (=-=Cox, 1994-=-). It shows only one agent, but several can be used. Customer Seller Seller sees the request and knows to return the response to the agent but does not know the identity of the customer. Agent The cus...

in ELECTRONIC

by J. D. Tygar
"... There is a tremendous demand to electronically buy and sell goods over networks. This field is called electronic commerce, and it has inspired a large variety of work. Unfortunately, much of this activity ignores traditional transaction processing concerns — chiefly atomicity. This paper discusses t ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
There is a tremendous demand to electronically buy and sell goods over networks. This field is called electronic commerce, and it has inspired a large variety of work. Unfortunately, much of this activity ignores traditional transaction processing concerns — chiefly atomicity. This paper discusses the role of atomicity in electronic commerce, pointing out various atomic flaws. Special attention is given to the atomicity problems of digital money proposals. Two examples of highly atomic electronic commerce systems, NetBill and cryptographic postage indicia, are presented. ELECTRONIC COMMERCE If you regularly use the World Wide Web, you have probably noticed that much of the information on it is worth what you pay for it. To improve the quality of available electronic information, we must create mechanisms to conveniently compensate the creators and owners of network information. If we want to put the Library of Congress online, we will first have to find a way to compensate copyright owners. Electronic commerce is an attempt to address such problems. The idea is to build mechanisms that make it simple to buy and sell goods online. These mechanisms have attracted significant interest. Besides enabling a new type of commerce, they appear to offer a variety of benefits, including increasing the range of information readily available to most people, 32 n W making automatic search and retrieval of that information easy, and reducing costs by simplifying or eliminating human involvement in processing and fulfilling orders. Here is one indicator of the excitement over electronic commerce: The June 12, 1995, issue of Business Week includes the following projection of the role of electronic commerce. This projection is probably overly optimistic, but it is a sign that electronic commerce is being taken seriously in some quarters.
(Show Context)

Citation Context

...y can be created or destroyed. Goods atomicity: If the protocol fails as a result of communications failure or processor failure before the NetBill server atomically processes the transaction in step =-=(7)-=-, then money does not change hands, and the customer does not receive the decryption key or gain access to the encrypted information goods. On the other hand, if step (7) succeeds, then both the merch...

copyright by

by Linda Jean Camp, Shaun Mcdermott , 1996
"... to ..."
Abstract - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ty and use of anonymity has its own dangers. A recipient of an anonymous electronic threat knows this truth too well. A detailed mechanism for anonymous and pseudonymous communication was proposed by =-=Cox, 1994-=-. 34s3| “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon pr...

FINAL VERSION

by Stefaan Seys, Claudia Diaz, Bart De Win, Vincent Naessens, Caroline Goemans, Joris Claessens, Wim Moreau, Prof Bart, De Decker, Prof Jos Dumortier, Prof Bart Preneel
"... Executive summary For applications such as electronic voting and electronic payments, anonymity and privacy are strictly necessary. In a democratic society public elections will be held anonymously and citizens have a fundamental right to privacy, for example when buying goods or subscribing to serv ..."
Abstract - Add to MetaCart
Executive summary For applications such as electronic voting and electronic payments, anonymity and privacy are strictly necessary. In a democratic society public elections will be held anonymously and citizens have a fundamental right to privacy, for example when buying goods or subscribing to services. However, current technologies such as databases, online connections, mobile communications, may lead to an increased erosion of privacy. For the time being no widespread communications and payment technologies are available to provide on-line shopping without giving away a substantial amount of personal information. Applications like email, publishing and web browsing are widely accepted without anonymity properties. This document describes the anonymity requirements of a variety of applications in which anonymity and privacy play an important role: (1) anonymous connections, which

TITLE AND SUBTITLE FINANCIAL TRANSACTION MECHANISMS FOR WORLD WIDE WEB APPLICATIONS FUNDING NUMBERS

by John R. Palumbo, Hemant Bhargava, Rex Buddenberg, Dtic Quality Inspected, Author(s John R. Palumbo , 1996
"... cxi ..."
Abstract - Add to MetaCart
Abstract not found

4. TITLE AND SUBTITLE FINANCIAL TRANSACTION MECHANISMS 5. FUNDING NUMBERS FOR WORLD WIDE WEB APPLICATIONS

by John R. Palumbo, Hemant Bhargava, Rex Buddenberg, Author(s John R. Palumbo , 1996
"... Approved for public release; distribution is unlimited. ..."
Abstract - Add to MetaCart
Approved for public release; distribution is unlimited.
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University