Establishing chain of evidence as a base for non-repudiation services

被引:0
|
作者
Hwang, JJ [1 ]
Shao, MH [1 ]
Wu, SS [1 ]
机构
[1] Chang Gung Univ, Dept Informat Management, Tao Yuan 333, Taiwan
关键词
evidence management; cycle of value transters; non-repudiation services; disputes resolution; electronic commerce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Disputes are inevitable in business. Disputes ill the real world are resolved ill various ways. Similarly, in the virtual world, there is a variety of non-repudiation services as defined in the ISO/IEC standards [5, 6, 7, 8]. Whatever actions are taken, evidence is the key to the successful conduct of these services. These previous works usually define the concept of non-repudiation services using a single piece of evidence, which fails to describe the causality of all event completely. In business, no activity is atomic, and evidence therefore does not exist as all atomic piece. Rather, evidence exists in the form of a series of relevant pieces of evidence. That is, we Must consider a series of activities-formed onto a cycle of value transfers. This paper introduces a chain-of-evidence concept to electronic commerce as a basis for the refinement of the pertinent international standards. The chain of evidence call be analyzed and derived from the cyclic model of value transfers. From information Security and information processing perspectives, this paper aims to provide a better evidence-management methodology as the first step to he taken ill settling any disputes. As a result, we expect that the research Will Contribute a theoretical basis for non-repudiation services in the practical world.
引用
收藏
页码:49 / 60
页数:12
相关论文
共 50 条
  • [31] Non-repudiation in SET: Open issues
    Van Herreweghen, E
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 140 - 156
  • [32] Non-repudiation in Ad Hoc Networks
    Tandel, Purvi
    Valiveti, Sharada
    Agrawal, K. P.
    Kotecha, K.
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 405 - 415
  • [33] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [34] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    [J]. Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [35] Securing digital signatures for non-repudiation
    Zhou, J
    Lam, KY
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 710 - 716
  • [36] Some guidelines for non-repudiation protocols
    Louridas, P
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (05) : 29 - 38
  • [37] Anonymous fingerprinting with direct non-repudiation
    Pfitzmann, B
    Sadeghi, AR
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 401 - 414
  • [38] Non-repudiation protocols for multiple entities
    Onieva, JA
    Zhou, JY
    Lopez, J
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (16) : 1608 - 1616
  • [39] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [40] A fair Non-repudiation service in a web services peer-to-peer environment
    Agreiter, Berthold
    Hafner, Michael
    Breu, Ruth
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 372 - 378