Bachelor Thesis : „ Security Aspects of Digital Actors “ By : Ayse Morali

نویسندگان

  • Ayse Morali
  • Erich Ortner
  • Carlos Varela
چکیده

Online computations are getting more and more embedded into the daily life of people, in particular, they have practical applications in electronic commerce. In the cyber world, mobile codes interact with each other and their environment on behalf of sellers and buyers of the real world. Mobile code technologies provide potential benefits to applications, but as the responsibilities and the complexity of mobile codes increase, the variety of security threats that imposed the applications increases as well. In order to protect these inherently distributed systems from attacks, their components have to consider security aspects, without giving up flexibility. Transparent information flow between the mobile codes and their environment can help increase efficiency for its participants and reduce user’s cognitive load, yet add points of vulnerability to the system. In this thesis we describe a middleware framework for online auctions, in order to illustrate security problems in electronic commerce applications and suggest potential solutions. This middleware framework is a model of a futuristic electronic marketplace, consisting of various management components and electronic stores. In the electronic stores, the mobile codes, embedded in software agents, representing sellers and buyers, come together, in order to fulfill their duties. Furthermore, we describe a set of security requirements of the electronic marketplace. We then survey different models of mobile code in distributed computations, including actors, secure mobile actors, transactors, casts and directors, and mobile ambients. We then classify and compare these models according to their applicability to the security of the electronic marketplace scenario. We demonstrate how additional security instruments, such as proof-carrying code and cryptographic techniques, can be incorporated to these models in order to fulfill the security requirements of the marketplace electronic commerce applications. In summary, we investigated the conflicting design goals of openness and security in electronic commerce applications. This research is a first step in achieving the goal of building open yet secure electronic commerce systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Risk and Business Goal Based Security Requirement and Countermeasure Prioritization

Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement ―good-enough security‖ but need to be able to justify their security investment plans. Currently companies achieve this by means of checklist-based security assessments, but these methods are a way to achieve consensus without bei...

متن کامل

Attacks on re-keying and renegotiation in Key Exchange Protocols Bachelor Thesis

The TLS protocol has been a subject of studies, analyses and verification attempts over the years, but a recently discovered attack against the key renegotiation in the TLS protocol underlined the need to more thoroughly study the key renegotiation phase and focus on aspects not investigated before. We study the key renegotiation phase of the TLS protocol and use formal models for automatic ver...

متن کامل

Turkish - Iranian Relations: Prospects and Uncertainty

Iran and Turkey are two key regional actors that separately play a role in multiple geographies in terms of both geographical weight and tenets of identity. Geographically speaking, these two countries are simultaneously influential in political-security issues in different areas such as the Fertile Crescent. When it comes to identity, by making a link between their principles and values to reg...

متن کامل

Secure Partial Results

Mobile agent technology has been around for many years, yet it has not had its break-through thus far, a major bottle-neck being the security aspects of this technology. This thesis evolves around a protocol called Secure Partial Results [53] that seeks to ensure the security of partial results generated at some remote host. To this end, the different classes of mobile agent security are introd...

متن کامل

Citation analysis of graduate Dental thesis references: Before and after an intervention

Background: Introduction of Iranian National Medical Digital Library (INLM) was a huge investment during several years ago. The aim of this study was to discover the effectiveness of this scientific intervention by examination of citation pattern among graduate dental thesis during before and after of INLM accessibility. Methods: This analytical study was conducted among all of graduate dental ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005