Trusted Email:

نویسندگان

  • Nien T. Sui
  • Saleh I. Alfuraih
  • Dennis McLeod
چکیده

Soft-products are intangible products that can be consumed without shipment, such as software, music and calling cards (calling time). The demand for soft-products on the Internet has been increasing for the past few years. At the same time, fraudulent credit card transactions have also increased. Compared to tangible products, fraudulent credit card transactions on soft-products are easier to conduct while difficult to recover. The fraudulent transaction is a major problem for e-commerce merchants, customers, and credit card issuers. In this paper, we classify the type of products sold on the Internet, and the common fraud that occurs for each type. We review some of the best existing credit card fraud prevention methods and introduce the Trusted email mechanism as a new way to prevent fraudulent transactions on soft-product. Trusted email is a custom email solution that can uniquely identify and authenticate the online customer, prevent unauthorized credit card transactions, and effectively resolve e-commerce disputes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements

Kremer and Markowitch introduced in [10] a new property for certified email protocols called no author-based selective receipt, and proposed two new protocols respecting it. In this paper we show that these protocols implicitly require the sender of the email to trust the trusted third party to assure this property. We propose a new protocol in which this trusted third party has only to be trus...

متن کامل

Assessment Of Paper: VPFS: Building a Virtual Private File System with a Small Trusted Computing Base

With the motivation to provide confidentiality, integrity and recoverability to security critical files, such as those used by banking programs or email clients, this paper describes a process whereby a multirlevel secure system is implemented to provide secure isolation between a small trusted computing base running trusted applications and the VPFS server, and a nonrsecure virtualized operati...

متن کامل

DANE Trusted Email for Supply Chain Management

Supply chain management is critically dependent on trusted email mechanisms that address forgery, confidentiality, and sender authenticity. The IETF protocol ‘Domain Authentication of Named Entities’ (DANE) described in this paper has been extended from its initial goal of providing TLS web site validation to also offer a foundation for globally scalable and interoperable email security. Widesp...

متن کامل

Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce

Soft-products are intangible products that can be consumed without shipment, such as software, music and calling cards (calling time). The demand for soft-products on the Internet has been increasing for the past few years. At the same time, fraudulent credit card transactions have also increased. Compared to tangible products, fraudulent credit card transactions on soft-products are easier to ...

متن کامل

Typed Computational Email for Serverless Distributed Applications

Peer agents are executable object-oriented email components exchanged between users as a basis of communication for distributed applications. Peer agents, which we implement, are strongly typed and are dispatched to user-installable trusted handlers based on their type. The type mechanism provides the flexible trust management needed to implement secure distributed distributed applications over...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004