Trusted Third-party Services in COSM

نویسندگان

  • Michael Merz
  • Winfried Lamersdorf
  • Kai Müller-Jones
چکیده

In the near future we can expect to use global communication networks at negligible communication costs therefore, it is becoming increasingly profitable for commercial network service providers to achieve online availability. The services provided may be implemented as software application modules with operational interfaces that require calling clients to follow a service-specific protocol. Some of these network services may adhere to common access standards (as already well-known from the ISO/RDA-standardisation effort for remote database access), others are too individualistic or volatile for a reasonable standardisation. If application level standards are too specific or restrictive, service providers lack significant features which distinguishes them from competitors. Moreover, the process of standardisation itself often hinders a profitable service offer as an 'early mover' on an electronic market (EM).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fair-Exchange Protocol Based on Off-line Semi-Trusted Third Party

The fairness of data exchange becomes a key factor for the transaction over the Internet. To ensure the fairness of data exchange, the protocol needs a trusted third party be a judge when the dispute occurs, and has to give a guarantee to main parties during the data exchange. To eliminate the third party’s connectional time and enhance its security, a fair-exchange protocol based on off-line s...

متن کامل

A Proposed Architecture for Trusted Third Party Services

In this paper we propose a novel solution to the problem of providing trusted third party services, such as the management of cryptographic keys for end-to-end encryption, in a way that meets legal requirements for warranted interception. Also included is a discussion of what might be a reasonable set of requirements for international provision of such services, as well as some analysis of the ...

متن کامل

Privacy Preserving Location Based Services

Location-based services require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. The system only requires a semi-trusted third party, responsible for carrying out simple matching operations correctly. This semi-trusted third party does not have any information about a user’s location...

متن کامل

Third Party Privacy Preserving Protocol for Secure Web Services

Web services is become major issue in distributed data mining. In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used...

متن کامل

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications

ASSERT4SOA project proposes machine readable certificates to be used to allow Web service requesters to automatically assess the security properties of Web services (and their providers) as certified by some trusted third party. This vision promises to open up an entire new market for certification services.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Electronic Markets

دوره 4  شماره 

صفحات  -

تاریخ انتشار 1994