Failure Analysis of an E-Commerce Protocol Using Model Checking

  title={Failure Analysis of an E-Commerce Protocol Using Model Checking},
  author={Indrakshi Ray and Indrajit Ray},
The increasingpopularityof electroniccommerce(e-commerce)hasnecessitatedthe development of e-commerceprotocols. Theseprotocolsensurethe confidentialityand integrity of informationexchanged.In addition,researchershave identifiedotherdesirableproperties,suchas,money atomicity, goodsatomicityandvalidatedreceipt,thatmustbesatisfiedby e-commerceprotocols.Thispapershows how modelcheckingcanbe usedto obtainan assuranceaboutthe existenceof thesepropertiesin an e-commerceprotocol. It is essentialthat… CONTINUE READING
Highly Cited
This paper has 52 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 18 extracted citations

PPF: A model-based tool for analyzing E-payment protocols

2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) • 2016
View 3 Excerpts
Highly Influenced

Analyzing a Fair Exchange E-commerce Protocol Using CSP and FDR

2010 International Conference on e-Education, e-Business, e-Management and e-Learning • 2010
View 1 Excerpt

Transactions and service level agreements for online music distribution

2009 International Conference for Internet Technology and Secured Transactions, (ICITST) • 2009
View 1 Excerpt

52 Citations

Citations per Year
Semantic Scholar estimates that this publication has 52 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 17 references

Model CheckingElectronicCommerceProtocols

N. Heintze, J. Tygar, J. Wing, andH. Wong
In Proceedingsof the2ndUSENIXWorkshopin Electronic Commer ce, • 1996
View 4 Excerpts
Highly Influenced

NetBill SecurityandTransactionProtocol

B. Cox, J. D. Tygar, andM. Sirbu
In Proceedingsof the FirstUSENIXWorkshopin Electronic Commer ce, • 1995
View 5 Excerpts
Highly Influenced

NetBill: An InternetCommerceSystemOptimizedfor Network Delivered Services.IEEE PersonalCommunications

M. Sirbu andJ.D. Tygar
View 5 Excerpts
Highly Influenced

Roscoe.Proving SecurityProtocolswith Model Checkersby DataIndependenceTechniques

A W.
In Proceedingsof the1998IEEE ComputerSecurityFoundationsWorkshop. IEEE ComputerSociety • 1998
View 1 Excerpt

Roscoe.TheTheoryandPracticeof Concurrency

A W.
PrenticeHall, GreatBritain, • 1998
View 2 Excerpts

Clarke,andS.Jha.A Model Checker for AuthenticationProtocols.In Proceedingsof theDIMACSWorkshopon DesignandFormal Verificationof SecurityProtocols. RutgersUniversity, NJ,September

E. W. Marrero
View 1 Excerpt

ElectronicCommerceProtocols.In Proceedingsof the10thIEEE ComputerSecurityFoundationsWorkshop, June1997

View 1 Excerpt

Roscoe.UsingCSPto detecterrorsin theTMN protocol

W. G. Lowe andA
IEEE Transactionson Software Engineering, • 1997
View 2 Excerpts

Usinga PVSEmbeddingof CSPto Verify AuthenticationProtocols.In TheoremProving in Higher OrderLogics, volume1275of Lecture Notesin ComputerScience, pages 121–136.Springer -Verlag,1997

B. DutertreandS.Schneider
View 1 Excerpt

andU. Stern.AutomatedAnalysisof CryptographicProtocolsUsingMurphi

J.Mitchell, M. Mitchell
In Proceedingsof theIEEESymposiumon SecurityandPrivacy, Oakland,CA, • 1997
View 1 Excerpt