Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
DOI: 10.1109/csac.1998.738608
|View full text |Cite
|
Sign up to set email alerts
|

Modelling secure and fair electronic commerce

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…A complete description of a business process, however, considers also at least two other perspectives (cf. [51]): At first, the informational perspective represents the information entities, their structure, and relationships between them. At second, the organizational perspective depicts in which place of an enterprise and by which agents activities are performed.…”
Section: Resultsmentioning
confidence: 99%
“…A complete description of a business process, however, considers also at least two other perspectives (cf. [51]): At first, the informational perspective represents the information entities, their structure, and relationships between them. At second, the organizational perspective depicts in which place of an enterprise and by which agents activities are performed.…”
Section: Resultsmentioning
confidence: 99%
“…In figure 8 we show the life cycle of the BILL-PAYMENT-ORDER in terms of the participating entities and their different states, using a UML state-chart diagram. As Röhm et al (1998) have emphasised in a similar example, the state 'valid' is important securitywise as it represents an object of type bill payment order, which although signed, the certificate of the signatory is expired or is revoked. In this case it becomes clear that as the payment order must be re-signed.…”
Section: Dynamic Viewmentioning
confidence: 99%
“…Additional roles may be needed for key management (figure 9). Using the five views for analysing and modelling the security semantics of business processes as proposed initially by Röhm et al (1998), the preceding sections offer a summarised view of a single process and the security requirements that had to be infused and performed by the 'Billing Mall'. It becomes clear that by modelling and analysing the security semantics of the business transactions it supports, the IS and its security are not treated as separate developments.…”
Section: Structural Viewmentioning
confidence: 99%
See 1 more Smart Citation
“…The main works related to security requirements specification in business processes [9][10][11][12][13] all coincide in the idea that it is necessary to capture the point of view of the business expert with regard to security, and to include these specifications within the software development process.…”
Section: Introductionmentioning
confidence: 99%