Seamless secured transactions
Abstract
Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self‐signed certification authorities. Depicts the relevant layers of interactions each option entails. Explains the structures of proprietary keying systems and of hierarchical certification authorities. Addresses the geopolitical elements ‐ especially policy and procedures, and national legal frameworks ‐ required to effectively implement the trust that secure transactions require.
Keywords
Citation
Liddy, C. and Sturgeon, A. (1998), "Seamless secured transactions", Information Management & Computer Security, Vol. 6 No. 1, pp. 21-27. https://doi.org/10.1108/09685229810207416
Publisher
:MCB UP Ltd
Copyright © 1998, MCB UP Limited