On the effects of authentication and authorisation infrastructures on e-commerce environments

被引:0
|
作者
Schlaeger, Christian [1 ]
Nowey, Thomas [1 ]
机构
[1] Univ Regensburg, D-8400 Regensburg, Germany
来源
关键词
authentication and authorisation infrastructures; risk assessment; e-commerce; IT-security; IT-outsourcing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication and Authorisation infrastructures (AAIs) support service providers on the Internet in outsourcing security services. AAIs influence and change the process of e-commerce transactions on multiple points. Changes influence users, service providers, and provider federations likewise. This work analyses the alterations implied by an AAI, comparing various AAI paradigms and traditional service providing. Effects explored comprise new functionalities, influenced trust relationships, risk management, economic factors, and user privacy. Compared to traditional service providing on the Internet, AAI usage is generally advantageous for all involved parties. However, allocations of services and AAI architectures have a direct impact on the benefits and risks. This work enables vendors and clients to assess security infrastructures and decide on the usage.
引用
收藏
页码:267 / 278
页数:12
相关论文
共 50 条
  • [1] Attribute-based authentication and authorisation infrastructures for e-commerce providers
    Schlaeger, Christian
    Sojer, Manuel
    Muschall, Bjoern
    Pernul, Guenther
    [J]. E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2006, 4082 : 132 - 141
  • [2] Authentication and authorisation infrastructures in b2c e-commerce
    Schlaeger, C
    Pernul, G
    [J]. E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2005, 3590 : 306 - 315
  • [3] Authentication in e-commerce
    Basu, A
    Muylle, S
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (12) : 159 - 166
  • [4] Effects of architectural decisions in authentication and authorisation infrastructures
    Schlaeger, Christian
    Ganslmayer, Monika
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 230 - +
  • [5] A secure anonymous authorisation architecture for e-commerce
    Au, WKR
    Choo, KKR
    Looi, M
    [J]. 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, Proceedings, 2005, : 106 - 111
  • [6] Patterns for authentication and authorisation infrastructures
    Erber, Roland
    Schlaeger, Christian
    Pernul, Guenther
    [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 755 - +
  • [7] Tripartite Authentication for an E-commerce System
    Constantinescu, Nicolae
    Boboila, Cristea
    [J]. APPLIED ECONOMICS, BUSINESS AND DEVELOPMENT, 2010, : 208 - 213
  • [8] Research on Authentication Technology of E-Commerce
    Hui, Hongwei
    Zhang, Ying
    [J]. ELEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, 2012, : 43 - +
  • [9] A Secure and Efficient Authentication in E-Commerce
    Kumbhakar, Dulal
    Sanyal, Kanchan
    Karforma, Sunil
    [J]. BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2021, 14 (05): : 93 - 99
  • [10] Biometric authentication for E-commerce transaction
    Vangala, RR
    Sasi, S
    [J]. 2004 IEEE INTERNATIONAL WORKSHOP ON IMAGING SYSTEMS AND TECHNIQUES (IST), 2004, : 113 - 116