Credentials management for high-value transactions

Glenn Benson, Shiu Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key infrastructure (PKI) for use in high-value commercial transactions, which require additional controls on the use of credentials for authentication and authorization. The need for additional controls is met by the use of partner key practice statements (PKPS), which are machine-readable policy statements precisely specifying a bank's policy for accepting and processing payment requests. As assurance is crucial for high-value transactions, we use an access-control logic to: (1) describe the protocol, (2) assure the logical consistency of the operations, and (3) to make the trust assumptions explicit.

Original languageEnglish (US)
Title of host publicationComputer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings
Pages169-182
Number of pages14
DOIs
StatePublished - 2010
Event5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010 - St. Petersburg, Russian Federation
Duration: Sep 8 2010Sep 10 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6258 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010
CountryRussian Federation
CitySt. Petersburg
Period9/8/109/10/10

Keywords

  • Authentication
  • Authorization
  • Logic
  • Protocols
  • Trust

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Credentials management for high-value transactions'. Together they form a unique fingerprint.

  • Cite this

    Benson, G., Chin, S. K., Croston, S., Jayaraman, K., & Older, S. (2010). Credentials management for high-value transactions. In Computer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings (pp. 169-182). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6258 LNCS). https://doi.org/10.1007/978-3-642-14706-7_13