Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Three Phased Schema for Sealed Bid Auction System Design
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Time-Stamping with Binary Linking Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Five sealed-bid auction models
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Accountability in organisations
International Journal of Information and Computer Security
Designing a secure e-tender submission protocol
Electronic Commerce Research
Design of a web-based tendering system for e-government procurement
Proceedings of the 3rd international conference on Theory and practice of electronic governance
Designing secure e-tendering systems
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
A major step is required to integrate critical legal requirements into e-tendering system design. The current systems using ad-hoc security mechanisms do not meet the legal requirements for forming a complex electronic contract. This paper analyses the e-tendering process and its legal obligations. The mapping of these obligations to security policies has identified a set of essential security services (mechanisms) for e-tendering systems, with particular emphasis on the contract forming process. These essential security services provide a promising solution for a reliable e-tendering system.