Verifying the SET Purchase Protocols
نویسندگان
چکیده
منابع مشابه
Verifying the Purchase Request in SET Protocol
The Secure Electronic Transaction (SET) protocol has been jointly developed by Visa and MasterCard toward achieving secure online-transactions. This paper presents formal verification of the Purchase Request phase of SET, by using ENDL (extension of nonmonotonic logic). The analysis unveils some potential flaws. To overcome these vulnerabilities, some feasible countermeasures are proposed accor...
متن کاملVerifying the SET registration protocols
SET (Secure Electronic Transaction) is an immense e-commerce protocol designed to improve the security of credit card purchases. In this paper we focus on the initial bootstrapping phases of SET, whose objective is the registration of cardholders and merchants with a SET certificate authority. The aim of registration is twofold: getting the approval of the cardholder’s or merchant’s bank, and r...
متن کاملVerifying Electronic Commerce Protocols
This proposal concerns protocol verification by formal proof. With EPSRC funding, Paulson has developed a new and highly successful approach to verifying security protocols: the inductive method. The protocols analyzed by this method include a standard Internet protocol (TLS, a descendant of SSL) [10] and one developed by a UK company, APM Ltd. [9]. APM’s protocol was difficult to analyze using...
متن کاملVerifying the SET Protocol: Overview
The project to verify SET, an e-commerce protocol, is described. The main tasks are to comprehend the written documentation, to produce an accurate formal model, to identify specific protocol goals, and finally to prove them. The main obstacles are the protocol’s complexity (due in part to its use of digital envelopes) and its unusual goals involving partial information sharing. Brief examples ...
متن کاملTAuth: Verifying Timed Security Protocols
Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Automated Reasoning
سال: 2006
ISSN: 0168-7433,1573-0670
DOI: 10.1007/s10817-005-9018-6