PRACTICAL AUDITABILITY IN TRUSTED MESSAGING SYSTEMS
Miguel Reis, Artur Romão, A. Eduardo Dias
2004
Abstract
The success of a dispute resolution over an electronic transaction depends on the possibility of trustworthily recreating it. It is crucial to maintain a trusted, thus fully auditable, repository to which a judge could request a transaction recreation. This article presents a practical scheme providing strong guarantees about the auditability of a trusted repository. We use the messaging paradigm to present the mechanism, but it can be applied to any other scenario that needs to maintain fully auditable long term information.
References
- Adams, C., Cain, P., Pinkas, D., and Zuccherato, R. (2001). Time-stamp protocol (tsp). RFC 3161, Internet Engineering Task Force.
- Dierks, T. and Allen, C. (1999). The tls protocol version 1.0. RFC 2246, Internet Engineering Task Force.
- Haber, S. and Stornetta, W. S. (1997). Secure names for bitstrings. In ACM Conference on Computer and Communications Security, pages 28-35.
- ITU-T (2000). Itu-t recommendation x.509. Technical report, ITU-T.
- Krawczyk, H., Bellare, M., and Canetti, R. (1997). Hmac: Keyed-hashing for message authentication. RFC 2104, Internet Engineering Task Force.
- Kremer, S., Markowitch, O., and Zhou, J. (2002). An intensive survey of fair non-repudiation protocols. Computer Communications, 25(17):1606-1621.
- Merkle, R. C. (1980). Protocols for public key cryptosystems. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 122-134. IEEE Computer Society Press.
- Myers, M., Ankney, R., Malpani, A., Galperin, S., and Adams, C. (1999). X.509 internet public key infrastructure online certificate status protocol - ocsp. RFC 2560, Internet Engineering Task Force.
- NIST (1994). NIST Federal Information Processing Standard Publication 180-1: Secure Hash Standard.
- Peha, J. M. (1999). Electronic commerce with verifiable audit trails. In Proceedings of ISOC.
- RSA (2000). Pkcs #10 v1.7: Certification request syntax standard. Technical report, RSA Laboratories.
- Schneier, B. (1995). Applied cryptography: protocols, algorithms, and source code in C. John Wiley and Sons, Inc., second edition.
- Zhou, J. (2001). Non-Repudiation in Electronic Commerce. Artech House, first edition.
Paper Citation
in Harvard Style
Reis M., Romão A. and Eduardo Dias A. (2004). PRACTICAL AUDITABILITY IN TRUSTED MESSAGING SYSTEMS . In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE, ISBN 972-8865-15-5, pages 169-174. DOI: 10.5220/0001392001690174
in Bibtex Style
@conference{icete04,
author={Miguel Reis and Artur Romão and A. Eduardo Dias},
title={PRACTICAL AUDITABILITY IN TRUSTED MESSAGING SYSTEMS},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE,},
year={2004},
pages={169-174},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001392001690174},
isbn={972-8865-15-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 2: ICETE,
TI - PRACTICAL AUDITABILITY IN TRUSTED MESSAGING SYSTEMS
SN - 972-8865-15-5
AU - Reis M.
AU - Romão A.
AU - Eduardo Dias A.
PY - 2004
SP - 169
EP - 174
DO - 10.5220/0001392001690174