Ticket-based service access scheme for mobile users
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
A framework for role-based group deligation in distributed environments
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
Protecting Information Sharing in Distributed Collaborative Environment
Advanced Web and NetworkTechnologies, and Applications
Delegating revocations and authorizations in collaborative business environments
Information Systems Frontiers
Role-Based delegation with negative authorization
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Secure and efficient information sharing in multi-university E-Learning environments
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Protecting disseminative information in E-Learning
ICWL'07 Proceedings of the 6th international conference on Advances in web based learning
Hi-index | 0.00 |
This paper proposes a secure, scalable anonymity and practical payment protocol for Internet purchases, and uses role based access control (RBAC) to manage the new payment scheme. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities. An agent provides a higher anonymous certificate and improves the security of the consumers. The agent will certify re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. With this new method, each consumer can get the required anonymity level, depending on the available time, computation and cost.We also analyse how to prevent a consumer from spending a coin more than once. Furthermore, we use RBAC to manage the new payment scheme. Each user may be assigned one or more roles, and each role can be assigned one or more privileges that are permitted to users in that role. Security administration with RBAC consists of determining operations that must be executed by persons in particular jobs, and assigning employees to proper roles. RBAC can improve system security and reduce conflicts of different roles. The complexities with RBAC can be decreased by mutually exclusive roles and role hierarchies.