2016
DOI: 10.1155/2016/7093642
|View full text |Cite
|
Sign up to set email alerts
|

Business Information Exchange System with Security, Privacy, and Anonymity

Abstract: Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anony… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 20 publications
(23 reference statements)
0
7
0
Order By: Relevance
“…Our current implementation is based on the concept of the Business Information Exchange (BIX) proxy system [4]. The technology used is PrimeFaces [7].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Our current implementation is based on the concept of the Business Information Exchange (BIX) proxy system [4]. The technology used is PrimeFaces [7].…”
Section: Methodsmentioning
confidence: 99%
“…With our security architecture, however, users access all ASP and SSP servers only indirectly, through the secure proxy [4]. The proxy assists users with all security protocols and in that way extends all security services with privacy and anonymity against both ASPs and SSPs.…”
Section: Modified Protocols Based On Secure Proxiesmentioning
confidence: 99%
See 1 more Smart Citation
“…By the trusted ring signature scheme based on property certificate, the authors have achieved the anonymity of computing nodes and prevented the leakage of platform configuration information. Muftic et al have combined this method with the characteristics of business data to build the business information exchange system with security, privacy, and anonymity which provides innovative features of privacy and full anonymity of users in the paper [7].…”
Section: Related Workmentioning
confidence: 99%
“…1, the message sender will negotiate the secret session key (marked as SK AB ) only with the specified recipient. The IM server in this type of system cannot do anything but transmit the encrypted data Enc(SK AB , M) accurately [2]. There is no doubt that architecture of type (b) is sufficiently safe for the most fastidious users.…”
Section: Introductionmentioning
confidence: 99%