PROTOCOL OF AUTHENTICITY TO PROVIDE LEGAL SECURITY IN E-CONTRACTS - A Prototype

João Fábio de Oliveira, Cinthia O. de A. Freitas, Altair Santin

Abstract

This paper discusses the security problems on the contracts deals over the Internet and describes a protocol of authenticity that will keep audit trails from the activities during the Web hiring. These audit trails will be stored digitally, either on the side of the provider or on the consumer. It is understood that it is legal obligation of the provider to logs and ensure the integrity of the data related to the operations on the Internet-based commerce. because in situations of dispute can occur a reversal of the burden of proof. Thus, this prototype ensures confidence on the e-contracts, logging relevant information that help in the identification of the parties, using a Plug-in software installed on the e-commerce provider and in the consumer machine, executable in the Web. Moreover, it is important to remind about the security in contracts agreements over the Internet is an essential feature because it allows the consumer a guarantee of contract award, since it maintains the integrity of the document, and also can be presented as evidence to the Judiciary, helping in litigation and satisfying the premises of the legal acceptance of digital documents.

References

  1. Atkins, D., Buis, P., Hare, C., Kelley, R., Nachenberg, C., Nelson, A.B., Phillips, P., Ritchey, T., Sheldon, T., Snyder, J. (1997). Internet security professional reference, New Riders Publishing, 2nd edition.
  2. Behrens, F. (2007). Digital signature and legal business. Jurua, 1st edition.
  3. Brazilian Internet Management Committee (Comitê Gestor da Internet Brasil), Center for Studies of Information and Communications Technology (2006). TIC Domicílios e Usuários (ICT Homes and Users. Available: http://www.cetic.br/, [11-march-2008].
  4. Chiu, D.K.W., Cheung, S.C., Till, S. A. (2003). Threelayer architecture for e-contract enforcement in an eservice environment. In 36th Annual Hawaii International Conference on System Sciences.
  5. Comer, D. E. (1991). Internetworking with TCP/IP: principles, protocols, and architecture, Prentice-Hall International, Inc., 2nd edition, Vol. 1.
  6. Garfinkel, S., Spafford, G. (1997). Web security & commerce. O'Reilly & Associates, Inc.
  7. Martin, E.A. (2003). A Dictionary of Law. Oxford University Press.
  8. Meier, J.D., Mackman, A., Vasireddy, S., Dunner, M., Escamilla, R., Murukan, A. (2003). Improving web application security: threats and countermeasures, Microsoft.
  9. Rezende, A.C.F. (1997). Notary's Office and the perfect notary: property law and notary's activities. Copola Livros. 1st edition.
  10. Schneier, B. (1996). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, Inc., 2nd edition.
Download


Paper Citation


in Harvard Style

Fábio de Oliveira J., O. de A. Freitas C. and Santin A. (2008). PROTOCOL OF AUTHENTICITY TO PROVIDE LEGAL SECURITY IN E-CONTRACTS - A Prototype . In Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2008) ISBN 978-989-8111-58-6, pages 378-383. DOI: 10.5220/0001907903780383


in Bibtex Style

@conference{ice-b08,
author={João Fábio de Oliveira and Cinthia O. de A. Freitas and Altair Santin},
title={PROTOCOL OF AUTHENTICITY TO PROVIDE LEGAL SECURITY IN E-CONTRACTS - A Prototype},
booktitle={Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2008)},
year={2008},
pages={378-383},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001907903780383},
isbn={978-989-8111-58-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2008)
TI - PROTOCOL OF AUTHENTICITY TO PROVIDE LEGAL SECURITY IN E-CONTRACTS - A Prototype
SN - 978-989-8111-58-6
AU - Fábio de Oliveira J.
AU - O. de A. Freitas C.
AU - Santin A.
PY - 2008
SP - 378
EP - 383
DO - 10.5220/0001907903780383