Network security: private communication in a public world
Network security: private communication in a public world
E-mail security: how to keep your electronic messages private
E-mail security: how to keep your electronic messages private
Computer networks: a systems approach
Computer networks: a systems approach
Elements of network protocol design
Elements of network protocol design
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Reliable Distributed Computing with the ISIS Toolkit
Reliable Distributed Computing with the ISIS Toolkit
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Signed Vector Timestamps: A Secure Protocol for Partial Order Time
Signed Vector Timestamps: A Secure Protocol for Partial Order Time
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies
Electronic Commerce Research
Analysis of the SET e-commerce protocol using a true concurrency process algebra
Proceedings of the 2006 ACM symposium on Applied computing
Hi-index | 0.00 |
Secure transactions form the computational basis for electronic commerce. Many forms of commerce depend upon there being a defined and verifiable relationship between messages in a transaction. We have identified three such relational properties: causality, atomicity and isolation. Causality is a new property. It allows the receiver of a message to deduce and verify the sequence of messages sent and received by the sender prior to that message. In this paper we present a secure transaction protocol that provides relational properties in addition to the normal properties of secure messages.