Authentic Data Collection in an Untrustworthy Computer Environment

نویسنده

  • Thomas J. Wilke
چکیده

A central matter in e-commerce and e-government is digital contracting and signing. The processes to be supported are to ensure a trustable and provable sequence of acts between the parties concerned following legal rules in a fast and flexible manner. Complex infrastructures like PKIs have been established to cope this task. But still there is a big lack: creating signatures in an untrustworthy computer environment. In this paper the problem of using desktop computer systems with or without card readers for signing documents containing binding declarations of intends for legal transactions will be discussed. Starting with analysing the process of digital signing and its key issues, the representation will point out that today’s common way of having documents digitally signed can be compromised despite the usage of so called class 3 card readers with smart cards and certificates of trustworthy CAs. The weak points of the employed signing process will be rolled out and a method will be introduced that guarantees the authenticity of signed data. As practical solution of the method explained a mobile device implementation pattern is presented. Finally an outlook will be given how to arrange processes and systems in order to provide e-contracting services in a flexible and trustable way.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impact of Authentic Leadership on Risk Perception of Employees with the Mediating Role of Safe Climate in Ilam Petrochemical Company

This study investigated the impact of of authentic leadership on risk perception of employees with the mediating role of safe climate in Ilam Petrochemical Company. The present study is considered a descriptive survey in terms of purpose, and applied in terms of data collection. The statistical population consisted of Ilam Petrochemical Company's official and contract staff with about 700 perso...

متن کامل

Authentic Learning for Computer Network with Mobile Device-Based Hands-On Labware

Computer network courses are essential parts of college computer science curriculum and hands-on networking experience is well recognized as an effective approach to help students understand better about the network concepts, the layered architecture of network protocols, and the dynamics of the networks. However, existing networking labs are usually server-based and relatively cumbersome, whic...

متن کامل

Effective Integration of Teaching and Research in a First Year Food and Nutrition Course

Previous research has indicated that undergraduate student learning can be enhanced through active involvement in research. Furthermore, creating an academic environment where teaching and research are intimately linked can facilitate the induction of students into a community of learners where new knowledge is created, explored and critiqued. Scaffolding and supporting student learning via eng...

متن کامل

An Efficient Resource Allocation for Processing Healthcare Data in the Cloud Computing Environment

Nowadays, processing large-media healthcare data in the cloud has become an effective way of satisfying the medical userschr('39') QoS (quality of service) demands. Providing healthcare for the community is a complex activity that relies heavily on information processing. Such processing can be very costly for organizations. However, processing healthcare data in cloud has become an effective s...

متن کامل

TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version)

We propose and evaluate TwoKind Authentication, a simple and effective technique that allows users to limit access to their private information in untrustworthy environments. Users often log in to Internet sites from insecure computers, and more recently have started divulging their email passwords to social-networking sites, thereby putting their private communications at risk. To mitigate thi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002