E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation

Fabio Piva, Ricardo Dahab

2011

Abstract

Fair exchange protocols have been widely studied since their proposal, but are still not implemented on most e-commerce transactions available. For several types of digital items (e-goods), the current e-commerce business models fail to provide fairness to customers. The item validation problem is a critical step in fair exchange, and is yet to receive the proper attention from researchers. We believe these issues should be addressed in a comprehensive and integrated fashion before fair exchange protocols can be effectively deployed in the marketplace. This is the aim of our research, and drawing attention to these problems and possible solutions is the goal of this paper.

References

  1. Asokan, N. (1998). Fairness in electronic commerce. Research Report RZ3027.
  2. Asokan, N. (1998). Fairness in electronic commerce. Research Report RZ3027.
  3. Bottoni, A., Dini, G., and Stabell-Kulø, T. (2007). A methodology for verification of digital items in fair exchange protocols with active trustee. Electronic Commerce Research, 7(2).
  4. Bottoni, A., Dini, G., and Stabell-Kulø, T. (2007). A methodology for verification of digital items in fair exchange protocols with active trustee. Electronic Commerce Research, 7(2).
  5. Cheng, H. and Li, X. (2000). Partial encryption of compressed images and videos. Signal Processing, IEEE Transactions on, 48(8):2439-2451.
  6. Cheng, H. and Li, X. (2000). Partial encryption of compressed images and videos. Signal Processing, IEEE Transactions on, 48(8):2439-2451.
  7. Gartner, F. C., Pagnia, H., and Vogt, H. (1999). Approaching a Formal Definition of Fairness in Electronic Commerce. SRDS.
  8. Gartner, F. C., Pagnia, H., and Vogt, H. (1999). Approaching a Formal Definition of Fairness in Electronic Commerce. SRDS.
  9. Kremer, S., Markowitch, O., and Zhou, J. (2002). An intensive survey of fair non-repudiation protocols. Computer Communications, 25(17):1606-1621.
  10. Kremer, S., Markowitch, O., and Zhou, J. (2002). An intensive survey of fair non-repudiation protocols. Computer Communications, 25(17):1606-1621.
  11. Kwong, S. (2006). An algorithm for removable visible watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 16(1):129-133.
  12. Kwong, S. (2006). An algorithm for removable visible watermarking. IEEE Transactions on Circuits and Systems for Video Technology, 16(1):129-133.
  13. Lacoste, G., Pfitzmann, B., Steiner, M., and Waidner, M. (2000). SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science (LNCS), 1854.
  14. Lacoste, G., Pfitzmann, B., Steiner, M., and Waidner, M. (2000). SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science (LNCS), 1854.
  15. Lian, S. (2009). Multimedia Content Encryption: Techniques and Applications.
  16. Lian, S. (2009). Multimedia Content Encryption: Techniques and Applications.
  17. Loytynoja, M., Cvejic, N., and Seppanen, T. (2007). Audio protection with removable watermarking. In 2007 6th International Conference on Information, Communications & Signal Processing, pages 1-4. IEEE.
  18. Loytynoja, M., Cvejic, N., and Seppanen, T. (2007). Audio protection with removable watermarking. In 2007 6th International Conference on Information, Communications & Signal Processing, pages 1-4. IEEE.
  19. Minder, L. (2007). Cryptography based on error correcting codes. algo.epfl.ch.
  20. Minder, L. (2007). Cryptography based on error correcting codes. algo.epfl.ch.
  21. Nenadic, A., Zhang, N., and Barton, S. (2004). FIDES - a Middleware ECommerce Security Solution. In The 3rd European Conference on Information Warfare and Security (ECIW, pages 295-304.
  22. Nenadic, A., Zhang, N., and Barton, S. (2004). FIDES - a Middleware ECommerce Security Solution. In The 3rd European Conference on Information Warfare and Security (ECIW, pages 295-304.
  23. Piva, F. R. (2009). Verificac¸a˜o formal de protocolos de trocas justas utilizando o método de espac¸os de fitas. Master's thesis, UNICAMP.
  24. Piva, F. R. (2009). Verificac¸a˜o formal de protocolos de trocas justas utilizando o método de espac¸os de fitas. Master's thesis, UNICAMP.
  25. Piva, F. R., Monteiro, J. R. M., and Dahab, R. (2007). Strand spaces and fair exchange: More on how to trace attacks and security problems. In Anais do VII SBSeg, Simpósio Brasileiro em Seguranc¸a da Informac¸ a˜o e de Sistemas Computacionais.
  26. Piva, F. R., Monteiro, J. R. M., and Dahab, R. (2007). Strand spaces and fair exchange: More on how to trace attacks and security problems. In Anais do VII SBSeg, Simpósio Brasileiro em Seguranc¸a da Informac¸ a˜o e de Sistemas Computacionais.
  27. Piva, F. R., Monteiro, J. R. M., and Dahab, R. (2009). Regarding timeliness in the context of fair exchange. In Network and Service Security, 2009. N2S 7809. International Conference on, pages 1-6.
  28. Piva, F. R., Monteiro, J. R. M., and Dahab, R. (2009). Regarding timeliness in the context of fair exchange. In Network and Service Security, 2009. N2S 7809. International Conference on, pages 1-6.
  29. Piva, F. R., Monteiro, J. R. M., Devegili, A. J., and Dahab, R. (2006). Applying Strand Spaces to Certified Delivery Proofs. In Anais do VI SBSeg, Simpósio Brasileiro em Seguranc¸a da Informac¸ a˜o e de Sistemas Computacionais.
  30. Piva, F. R., Monteiro, J. R. M., Devegili, A. J., and Dahab, R. (2006). Applying Strand Spaces to Certified Delivery Proofs. In Anais do VI SBSeg, Simpósio Brasileiro em Seguranc¸a da Informac¸ a˜o e de Sistemas Computacionais.
  31. Servetti, A., Testa, C., and Martin, J. D. (2003). Frequencyselective partial encryption of compressed audio. IEEE International Conference on Aucoustics.
  32. Servetti, A., Testa, C., and Martin, J. D. (2003). Frequencyselective partial encryption of compressed audio. IEEE International Conference on Aucoustics.
  33. Thayer, F. J., Herzog, J. C., and Guttman, J. D. (1999). Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security, 7(2-3):191-230.
  34. Thayer, F. J., Herzog, J. C., and Guttman, J. D. (1999). Strand Spaces: Proving Security Protocols Correct. Journal of Computer Security, 7(2-3):191-230.
  35. Valimaki, M. and Oksanen, V. (2006). DRM interoperability and intellectual property policy in europe.
  36. Valimaki, M. and Oksanen, V. (2006). DRM interoperability and intellectual property policy in europe.
  37. Vogt, H. (2003). Asynchronous optimistic fair exchange based on revocable items. In Financial Cryptography, pages 208-222.
  38. Vogt, H. (2003). Asynchronous optimistic fair exchange based on revocable items. In Financial Cryptography, pages 208-222.
Download


Paper Citation


in Harvard Style

Piva F. and Dahab R. (2011). E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 317-324. DOI: 10.5220/0003523303170324


in Harvard Style

Piva F. and Dahab R. (2011). E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 317-324. DOI: 10.5220/0003523303170324


in Bibtex Style

@conference{secrypt11,
author={Fabio Piva and Ricardo Dahab},
title={E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={317-324},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003523303170324},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={Fabio Piva and Ricardo Dahab},
title={E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={317-324},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003523303170324},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation
SN - 978-989-8425-71-3
AU - Piva F.
AU - Dahab R.
PY - 2011
SP - 317
EP - 324
DO - 10.5220/0003523303170324


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - E-COMMERCE AND FAIR EXCHANGE - The Problem of Item Validation
SN - 978-989-8425-71-3
AU - Piva F.
AU - Dahab R.
PY - 2011
SP - 317
EP - 324
DO - 10.5220/0003523303170324