Model checking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Xml, Web Services, and the Data Revolution
Xml, Web Services, and the Data Revolution
Global Scheduling for Flexible Transactions in Heterogeneous Distributed Database Systems
IEEE Transactions on Knowledge and Data Engineering
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
DAMLJessKB: A Tool for Reasoning with the Semantic Web
IEEE Intelligent Systems
ACM SIGecom Exchanges
CSP and determinism in security modelling
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Failure Analysis of an E-Commerce Protocol Using Model Checking
WECWIS '00 Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000)
Model checking for design and assurance of e-business processes
Decision Support Systems
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Model checking for E-business control and assurance
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
ACTLW - An action-based computation tree logic with unless operator
Information Sciences: an International Journal
Unconditionally secure cryptosystems based on quantum cryptography
Information Sciences: an International Journal
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Creating automated plans for Semantic Web applications through planning as model checking
Expert Systems with Applications: An International Journal
A probabilistic reputation model based on transaction ratings
Information Sciences: an International Journal
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Practical electronic auction scheme with strong anonymity and bidding privacy
Information Sciences: an International Journal
An enhanced flow analysis technique for detecting unreachability faults in concurrent systems
Information Sciences: an International Journal
Symbolic model checking composite Web services using operational and control behaviors
Expert Systems with Applications: An International Journal
Metamodeling to Control and Audit E-Commerce Web Applications
International Journal of Electronic Commerce
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.07 |
Electronic commerce can be defined as the conduct of commerce in goods and services, with the assistance of telecommunications and telecommunications-based tools. The economic growth potential of e-commerce is extraordinary-but so are the challenges that lie on the path toward success. One of the more pressing challenges is how to ensure the integrity and reliability of the transaction process: key aspects being fair-exchange and atomicity assurance. This paper delineates an extended fair-exchange standard, which includes atomicity assurance, intended for a wide audience including e-commerce designers, managers, users, and auditors. We demonstrate how such a standard prevents or mitigates important e-commerce concerns. To bridge theory with practice, we illustrate how the application of model checking can be used to verify the correctness of the implementation of e-commerce protocols to prevent the failure of such protocols when unforeseen circumstances occur.