skip to main content
article
Free access

The application of model checking for securing e-commerce transactions

Published: 01 June 2006 Publication History

Abstract

Model checking is an effective component for performing online transactions that build customer trust and confidence.

References

[1]
Anderson, B.B., Hansen, J.V., Lowry, P.B., and Summers, S. Model checking for design and assurance of e-business processes. Decision Support Systems 39 (2005), 333--344.]]
[2]
Anderson, B.B., Hansen, J.V., Lowry, P.B., and Summers, S. Model checking for e-commerce control and assurance. IEEE Trans. Systems, Man, and Cybernetics: Part C, 35 (2005) 445--450.]]
[3]
Chaum, D., Fiat, A., and Naor, M. Untraceable electronic cash. In Proceedings of Advances in Cryptology (Santa Barbara, CA, 1989), 319--327.]]
[4]
Cox, B., Tygar, J., and Sirbu, M. NetBill security and transaction protocol. In Proceedings of The 1st USENIX Workshop in Electronic Commerce (New York, NY, 1995), 77--88.]]
[5]
Heintze, N., Tygar, J., Wing, J., and Wong, H. Model checking electronic commerce protocols. In Proceedings of the 2nd USENIX Workshop in Electronic Commerce (Oakland, CA, 1996), 147--164.]]
[6]
Lowe, G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems (1996), 147--166.]]
[7]
Ray, I., and Ray, I. Failure analysis of an e-commerce protocol using model checking. In Proceedings of the 2nd International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems (Milpitas, CA, 2000), 176--183.]]
[8]
Ray, I., Ray, I., and Narasimhamurthi, N. A fair-exchange e-commerce protocol with automated dispute resolution. In Proceedings of the 14th Annual IFIP WG 11.e Working Conference on Database Security (The Netherlands, 2000).]]
[9]
Roscoe, A. CSP and determinism in security modeling. In Proceedings of the 1995 IEEE Symposium on Security and Privacy (Oakland, CA, 1995), 114--127.]]
[10]
Schuldt, H., Popovici, A., and Schek, H-J. Execution guarantees in electronic commerce payments. Lecture Notes in Computer Science 1773 (2000), 193--202.]]
[11]
Tygar, J.D. Atomicity versus anonymity: Distributed transactions for electronic commerce. In Proceedings of the 24th International Conference on Very Large Databases (New York, NY, 1998).]]
[12]
Wang, W., Hidvegi, Z., and Bailey, A. E-process design and assurance using model checking. IEEE Computer 33 (2002), 48--53.]]

Cited By

View all
  • (2023)An Intrusion Detection System and Attack Intension Used in Network Forensic ExplorationIntelligent Systems and Machine Learning10.1007/978-3-031-35078-8_28(334-345)Online publication date: 10-Jul-2023
  • (2018)Efficient Verification of Service-Based Applications for Flexible Modeling2018 IEEE International Conference on Services Computing (SCC)10.1109/SCC.2018.00020(97-104)Online publication date: Jul-2018
  • (2014)Contained nomadic information environmentsInformation and Management10.1016/j.im.2013.11.00751:2(225-239)Online publication date: 1-Mar-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 49, Issue 6
Hacking and innovation
June 2006
108 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1132469
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2006
Published in CACM Volume 49, Issue 6

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)197
  • Downloads (Last 6 weeks)24
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)An Intrusion Detection System and Attack Intension Used in Network Forensic ExplorationIntelligent Systems and Machine Learning10.1007/978-3-031-35078-8_28(334-345)Online publication date: 10-Jul-2023
  • (2018)Efficient Verification of Service-Based Applications for Flexible Modeling2018 IEEE International Conference on Services Computing (SCC)10.1109/SCC.2018.00020(97-104)Online publication date: Jul-2018
  • (2014)Contained nomadic information environmentsInformation and Management10.1016/j.im.2013.11.00751:2(225-239)Online publication date: 1-Mar-2014
  • (2012)Metamodeling to Control and Audit E-Commerce Web ApplicationsInternational Journal of Electronic Commerce10.2753/JEC1086-441517010417:1(83-118)Online publication date: 1-Oct-2012
  • (2012)Security Requirements for Uniformly Parameterised CooperationsProceedings of the 2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing10.1109/PDP.2012.27(288-292)Online publication date: 15-Feb-2012
  • (2011)Formalizing business process specificationsComputer Science and Information Systems10.2298/CSIS110111015S8:2(427-446)Online publication date: 2011
  • (2011)E-commerceElectronic Commerce Research10.1007/s10660-011-9083-311:4(421-456)Online publication date: 1-Nov-2011
  • (2011)Attack Intention Analysis Model for Network ForensicsSoftware Engineering and Computer Systems10.1007/978-3-642-22191-0_35(403-411)Online publication date: 2011
  • (2011)Framework for Business Process VerificationBusiness Information Systems10.1007/978-3-642-21863-7_5(50-61)Online publication date: 2011
  • (2009)An Efficient Adaptive Supply Chain Model in B2C Electronic CommerceProceedings of the 2009 International Symposium on Information Engineering and Electronic Commerce10.1109/IEEC.2009.10(16-20)Online publication date: 16-May-2009
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media