The Rational Unified Process: an introduction
The Rational Unified Process: an introduction
Off-Line Generation of Limited-Use Credit Card Numbers
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series)
Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series)
Basic considerations on AVS DRM architecture
Journal of Computer Science and Technology - Special section on China AVS standard
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
A DRM system supporting what you see is what you pay
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Identity-Based DRM: personal entertainment domain
Transactions on Data Hiding and Multimedia Security I
Digital rights management with right delegation for home networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Hi-index | 0.00 |
In E-Commerce credit cards gained popularity as a sophisticated payment mechanism. With the increase in credit card use on web, credit card fraud has gone up dramatically. Which cause customer's inconvenience and for merchant, loss of customers. To combat credit card fraud and to regain the customer's trust an attempt is made here to design a trust based payment system, in which the customer does not need to disclose his/her credit card number during the transaction, and hence they can feel safe. In this newly proposed system on behalf of the customer the bank or the issuer of the credit card is involved to perform the transaction. This is basically done by generating a single use 'token' by the bank which includes information about the customer, merchant, product, payment amount, date of issue and date of expiry etc. and thereafter wrapped as a DRM package. Among various advantages, one is that only the intended user and the specified application software can open the DRM package using special key. The application, thereafter, will take care of the rights imposed on the 'token' and expires itself after the single use. We have tried an attempt to use UML to design the model of such system, which is the recent trend of software engineering practice.