A consumer scalable anonymity payment scheme with role based access control
Proceedings of the Second International Conference on Web …, 2001•ieeexplore.ieee.org
This paper proposes a secure, scalable anonymity and practical payment protocol for
Internet purchases, and uses role based access control (RBAC) to manage the new
payment scheme. The protocol uses electronic cash for payment transactions. In this new
protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried
about disclosure of their identities. An agent provides a higher anonymous certificate and
improves the security of the consumers. The agent will certify re-encrypted data after …
Internet purchases, and uses role based access control (RBAC) to manage the new
payment scheme. The protocol uses electronic cash for payment transactions. In this new
protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried
about disclosure of their identities. An agent provides a higher anonymous certificate and
improves the security of the consumers. The agent will certify re-encrypted data after …
This paper proposes a secure, scalable anonymity and practical payment protocol for Internet purchases, and uses role based access control (RBAC) to manage the new payment scheme. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities. An agent provides a higher anonymous certificate and improves the security of the consumers. The agent will certify re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. With this new method, each consumer can get the required anonymity level, depending on the available time, computation and cost. We also analyse how to prevent a consumer from spending a coin more than once. Furthermore, we use RBAC to manage the new payment scheme. Each user may be assigned one or more roles, and each role can be assigned one or more privileges that are permitted to users in that role. Security administration with RBAC consists of determining operations that must be executed by persons in particular jobs, and assigning employees to proper roles. RBAC can improve system security and reduce conflicts of different roles. The complexities with RBAC can be decreased by mutually exclusive roles and role hierarchies.
ieeexplore.ieee.org
Showing the best result for this search. See all results