Avoiding loss of fairness owing to failures in fair data exchange systems
نویسندگان
چکیده
Fair exchange between mutually distrusted parties has been recognized as an important issue in electronic commerce. Ž . Ž . However, the correctness fairness of the existing fair exchange protocols that use a Trusted Third Party TTP is based on the assumption that during an exchange there are no failures at any of the local systems involved in the exchange, which is Ž . Ž . too strong in many situations. This paper points out that 1 system failures may cause loss of fairness, and 2 most of the existing fair exchange protocols that use a TTP cannot ensure fairness in presence of system failures. This paper presents two categories of techniques, transaction-based approaches and message-logging-based approaches, to help develop data exchange systems that can recover from system failures without losing fairness. q 2000 Elsevier Science B.V. All rights
منابع مشابه
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols
Fair exchange between two or more potentially mutually distrusted parties has been identified as an important issue in electronic commerce. However, the correctness (fairness) of the existing fair exchange protocols that use a Trusted Third Party (TTP) is based on the assumption that during an exchange there are no failures at any of the local systems involved in the exchange, which is too stro...
متن کاملAchieving autonomous fair exchange in ubiquitous network settings
This paper addresses the issue of fair (signature or key) exchange in emerging ubiquitous commerce (ucommerce). Such an application poses new security challenges. In particular, it involves distributed and autonomous operations running in a much open, dynamic and resource-diversified networking environment, which makes an exchange highly susceptible to security attacks and system failures. Exis...
متن کاملGracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a tamper proof security module. The security modules trust each other but can only communicate by exchanging messages through their host parties. These hosts are untrusted and could intercept and drop those messages. We describe a...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Decision Support Systems
دوره 31 شماره
صفحات -
تاریخ انتشار 2001