File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/1132469.1132474
- Scopus: eid_2-s2.0-33745906823
- WOS: WOS:000237624000027
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: The application of model checking for securing E-commerce transactions
Title | The application of model checking for securing E-commerce transactions |
---|---|
Authors | |
Issue Date | 2006 |
Citation | Communications of the ACM, 2006, v. 49, n. 6, p. 97-101 How to Cite? |
Abstract | Model checking is an evolving technology for effective and efficient evaluation of e-business protocols. The technology is based on automated techniques such as simulation or theorem proving. E-business managers, developers, and auditors require tools to assure users that e-business systems are secure and reliable. Money atomicity, goods atomicity, and validated receipt are critical e-process requirements in addition to designing effective e-business protocols. Model checking provides verification of whether or not our system guarantees these requirements by writing them as specifications in the model checker. The model checker returns a counter example which allows the analyst to immediately see how the requirement can be violated, if a specification is not specified, which helps in modifying the system to resolve the problem. The assurance provided by model checking can ensure greater confidence in e-process and thereby increase the acceptance and legitimacy of e-business. |
Persistent Identifier | http://hdl.handle.net/10722/233769 |
ISSN | 2023 Impact Factor: 11.1 2023 SCImago Journal Rankings: 2.957 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Anderson, Bonnie Brinton | - |
dc.contributor.author | Hansen, James V. | - |
dc.contributor.author | Lowry, Paul Benjamin | - |
dc.contributor.author | Summers, Scott L. | - |
dc.date.accessioned | 2016-09-27T07:21:36Z | - |
dc.date.available | 2016-09-27T07:21:36Z | - |
dc.date.issued | 2006 | - |
dc.identifier.citation | Communications of the ACM, 2006, v. 49, n. 6, p. 97-101 | - |
dc.identifier.issn | 0001-0782 | - |
dc.identifier.uri | http://hdl.handle.net/10722/233769 | - |
dc.description.abstract | Model checking is an evolving technology for effective and efficient evaluation of e-business protocols. The technology is based on automated techniques such as simulation or theorem proving. E-business managers, developers, and auditors require tools to assure users that e-business systems are secure and reliable. Money atomicity, goods atomicity, and validated receipt are critical e-process requirements in addition to designing effective e-business protocols. Model checking provides verification of whether or not our system guarantees these requirements by writing them as specifications in the model checker. The model checker returns a counter example which allows the analyst to immediately see how the requirement can be violated, if a specification is not specified, which helps in modifying the system to resolve the problem. The assurance provided by model checking can ensure greater confidence in e-process and thereby increase the acceptance and legitimacy of e-business. | - |
dc.language | eng | - |
dc.relation.ispartof | Communications of the ACM | - |
dc.title | The application of model checking for securing E-commerce transactions | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/1132469.1132474 | - |
dc.identifier.scopus | eid_2-s2.0-33745906823 | - |
dc.identifier.volume | 49 | - |
dc.identifier.issue | 6 | - |
dc.identifier.spage | 97 | - |
dc.identifier.epage | 101 | - |
dc.identifier.eissn | 0001-0782 | - |
dc.identifier.isi | WOS:000237624000027 | - |
dc.identifier.issnl | 0001-0782 | - |