File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: The application of model checking for securing E-commerce transactions

TitleThe application of model checking for securing E-commerce transactions
Authors
Issue Date2006
Citation
Communications of the ACM, 2006, v. 49, n. 6, p. 97-101 How to Cite?
AbstractModel checking is an evolving technology for effective and efficient evaluation of e-business protocols. The technology is based on automated techniques such as simulation or theorem proving. E-business managers, developers, and auditors require tools to assure users that e-business systems are secure and reliable. Money atomicity, goods atomicity, and validated receipt are critical e-process requirements in addition to designing effective e-business protocols. Model checking provides verification of whether or not our system guarantees these requirements by writing them as specifications in the model checker. The model checker returns a counter example which allows the analyst to immediately see how the requirement can be violated, if a specification is not specified, which helps in modifying the system to resolve the problem. The assurance provided by model checking can ensure greater confidence in e-process and thereby increase the acceptance and legitimacy of e-business.
Persistent Identifierhttp://hdl.handle.net/10722/233769
ISSN
2023 Impact Factor: 11.1
2023 SCImago Journal Rankings: 2.957
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorAnderson, Bonnie Brinton-
dc.contributor.authorHansen, James V.-
dc.contributor.authorLowry, Paul Benjamin-
dc.contributor.authorSummers, Scott L.-
dc.date.accessioned2016-09-27T07:21:36Z-
dc.date.available2016-09-27T07:21:36Z-
dc.date.issued2006-
dc.identifier.citationCommunications of the ACM, 2006, v. 49, n. 6, p. 97-101-
dc.identifier.issn0001-0782-
dc.identifier.urihttp://hdl.handle.net/10722/233769-
dc.description.abstractModel checking is an evolving technology for effective and efficient evaluation of e-business protocols. The technology is based on automated techniques such as simulation or theorem proving. E-business managers, developers, and auditors require tools to assure users that e-business systems are secure and reliable. Money atomicity, goods atomicity, and validated receipt are critical e-process requirements in addition to designing effective e-business protocols. Model checking provides verification of whether or not our system guarantees these requirements by writing them as specifications in the model checker. The model checker returns a counter example which allows the analyst to immediately see how the requirement can be violated, if a specification is not specified, which helps in modifying the system to resolve the problem. The assurance provided by model checking can ensure greater confidence in e-process and thereby increase the acceptance and legitimacy of e-business.-
dc.languageeng-
dc.relation.ispartofCommunications of the ACM-
dc.titleThe application of model checking for securing E-commerce transactions-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/1132469.1132474-
dc.identifier.scopuseid_2-s2.0-33745906823-
dc.identifier.volume49-
dc.identifier.issue6-
dc.identifier.spage97-
dc.identifier.epage101-
dc.identifier.eissn0001-0782-
dc.identifier.isiWOS:000237624000027-
dc.identifier.issnl0001-0782-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats