Credentials management for high-value transactions

Glenn Benson, Shiu Kai Chin, Sean Croston, Karthick Jayaraman, Susan B Older

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Partner key management (PKM) is an interoperable credential management protocol for online commercial transactions of high value. PKM reinterprets traditional public key infrastructure (PKI) for use in high-value commercial transactions, which require additional controls on the use of credentials for authentication and authorization. The need for additional controls is met by the use of partner key practice statements (PKPS), which are machine-readable policy statements precisely specifying a bank's policy for accepting and processing payment requests. As assurance is crucial for high-value transactions, we use an access-control logic to: (1) describe the protocol, (2) assure the logical consistency of the operations, and (3) to make the trust assumptions explicit.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages169-182
Number of pages14
Volume6258 LNCS
DOIs
StatePublished - 2010
Event5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010 - St. Petersburg, Russian Federation
Duration: Sep 8 2010Sep 10 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6258 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010
CountryRussian Federation
CitySt. Petersburg
Period9/8/109/10/10

    Fingerprint

Keywords

  • Authentication
  • Authorization
  • Logic
  • Protocols
  • Trust

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Benson, G., Chin, S. K., Croston, S., Jayaraman, K., & Older, S. B. (2010). Credentials management for high-value transactions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6258 LNCS, pp. 169-182). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6258 LNCS). https://doi.org/10.1007/978-3-642-14706-7_13