A Formal and Executable Specification of the Internet Open Trading Protocol
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
The application of model checking for securing e-commerce transactions
Communications of the ACM - Hacking and innovation
Model checking for design and assurance of e-business processes
Decision Support Systems
An incentive-based electronic payment scheme for digital content transactions over the Internet
Journal of Network and Computer Applications
Secure Transaction Protocol for CEPS Compliant EPS in Limited Connectivity Environment
EC-Web 2009 Proceedings of the 10th International Conference on E-Commerce and Web Technologies
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
A fair multimedia exchange protocol
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Model-Based analysis of money accountability in electronic purses
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Hi-index | 0.00 |
The rapid growth of electronic commerce (e-commerce) has necessitated the development of e-commerce protocols. These protocols ensure the confidentiality and integrity of information exchanged. In addition, researchers have identified other desirable properties, such as, money atomicity, goods atomicity and validated receipt that must be satisfied by e-commerce protocols. This paper shows how model checking can be used to obtain an assurance about the existence of these properties in an e-commerce protocol. It is essential that these desirable properties be satisfied, even in the presence of site or communication failure. Using the model checker, we evaluate which failures cause the violation of one or more of the properties. The results of the analysis are then used to propose a mechanism that handles the failures to make the protocol failure resilient.