Failure Analysis of an E-Commerce Protocol Using Model Checking

@inproceedings{Ray2000FailureAO,
  title={Failure Analysis of an E-Commerce Protocol Using Model Checking},
  author={Indrakshi Ray and Indrajit Ray},
  booktitle={WECWIS},
  year={2000}
}
The increasingpopularityof electroniccommerce(e-commerce)hasnecessitatedthe development of e-commerceprotocols. Theseprotocolsensurethe confidentialityand integrity of informationexchanged.In addition,researchershave identifiedotherdesirableproperties,suchas,money atomicity, goodsatomicityandvalidatedreceipt,thatmustbesatisfiedby e-commerceprotocols.Thispapershows how modelcheckingcanbe usedto obtainan assuranceaboutthe existenceof thesepropertiesin an e-commerceprotocol. It is essentialthat… CONTINUE READING
Highly Cited
This paper has 28 citations. REVIEW CITATIONS

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
18 Extracted Citations
17 Extracted References
Similar Papers

Citing Papers

Publications influenced by this paper.
Showing 1-10 of 18 extracted citations

Referenced Papers

Publications referenced by this paper.
Showing 1-10 of 17 references

Model CheckingElectronicCommerceProtocols

  • N. Heintze, J. Tygar, J. Wing, andH. Wong
  • In Proceedingsof the2ndUSENIXWorkshopin…
  • 1996
Highly Influential
4 Excerpts

NetBill SecurityandTransactionProtocol

  • B. Cox, J. D. Tygar, andM. Sirbu
  • In Proceedingsof the FirstUSENIXWorkshopin…
  • 1995
Highly Influential
5 Excerpts

NetBill: An InternetCommerceSystemOptimizedfor Network Delivered Services.IEEE PersonalCommunications

  • M. Sirbu andJ.D. Tygar
  • 1995
Highly Influential
5 Excerpts

Roscoe.Proving SecurityProtocolswith Model Checkersby DataIndependenceTechniques

  • A W.
  • In Proceedingsof the1998IEEE…
  • 1998
1 Excerpt

Roscoe.TheTheoryandPracticeof Concurrency

  • A W.
  • PrenticeHall, GreatBritain,
  • 1998
2 Excerpts

Clarke,andS.Jha.A Model Checker for AuthenticationProtocols.In Proceedingsof theDIMACSWorkshopon DesignandFormal Verificationof SecurityProtocols. RutgersUniversity, NJ,September

  • E. W. Marrero
  • 1997
1 Excerpt

ElectronicCommerceProtocols.In Proceedingsof the10thIEEE ComputerSecurityFoundationsWorkshop, June1997

  • 1997
1 Excerpt

Roscoe.UsingCSPto detecterrorsin theTMN protocol

  • W. G. Lowe andA
  • IEEE Transactionson Software Engineering,
  • 1997
2 Excerpts

Usinga PVSEmbeddingof CSPto Verify AuthenticationProtocols.In TheoremProving in Higher OrderLogics, volume1275of Lecture Notesin ComputerScience, pages 121–136.Springer -Verlag,1997

  • B. DutertreandS.Schneider
  • 1997
1 Excerpt

andU. Stern.AutomatedAnalysisof CryptographicProtocolsUsingMurphi

  • J.Mitchell, M. Mitchell
  • In Proceedingsof theIEEESymposiumon…
  • 1997
1 Excerpt

Similar Papers

Loading similar papers…