메뉴 건너뛰기




Volumn 74, Issue , 2001, Pages 489-505

Security modelling for electronic commerce: The common electronic purse specifications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED SOFTWARE ENGINEERING; E-GOVERNMENT; ELECTRONIC MONEY; SPECIFICATIONS;

EID: 84904204049     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-306-47009-8_36     Document Type: Conference Paper
Times cited : (23)

References (31)
  • 2
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • November
    • R. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32-40, November 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.1
  • 8
    • 23144452315 scopus 로고    scopus 로고
    • CEPSCO, Business Requirements vers. 7.0, Functional Requirements vers. 6.3, Technical Specification vers.2.2, available from
    • CEPSCO. Common Electronic Purse Specifications, 2000. Business Requirements vers. 7.0, Functional Requirements vers. 6.3, Technical Specification vers.2.2, available from http://www.cepsco.com.
    • Common Electronic Purse Specifications, 2000
  • 12
    • 19144370194 scopus 로고    scopus 로고
    • On the verification of cryptographic protocols - a tale of two committees
    • volume 32 of Electronical Notes in Theoretical Computer Science
    • D. Gollmann. On the verification of cryptographic protocols - a tale of two committees. In Workshop on Security Architectures and Information Flow, volume 32 of Electronical Notes in Theoretical Computer Science, 2000.
    • (2000) Workshop On Security Architectures and Information Flow
    • Gollmann, D.1
  • 13
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
    • Stefanos Gritzalis, Diomidis Spinellis, and Panagiotis Georgiadis. Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Computer Communications, 22(8):695-707, 1999.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 695-707
    • Gritzalis, S.1    Spinellis, D.2    Georgiadis, P.3
  • 19
    • 84944220091 scopus 로고    scopus 로고
    • In H. Hußmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International Conference), LNCS. Springer
    • Jan Jürjens. Towards development of secure systems using UML. In H. Hußmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International Conference), LNCS. Springer, 2001c.
    • (2001) Towards Development of Secure Systems Using UML
    • Jürjens, J.1
  • 22
    • 0031335394 scopus 로고    scopus 로고
    • Threat scenarios as a means to formally develop secure systems
    • V. Lotz. Threat scenarios as a means to formally develop secure systems. Journal of Computer Security 5, pages 31-67, 1997.
    • (1997) Journal of Computer Security , vol.5 , pp. 31-67
    • Lotz, V.1
  • 24
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 85-128
    • Paulson, L.C.1
  • 26
    • 0034823388 scopus 로고    scopus 로고
    • A model for asynchronous reactive systems and its applications to secure message transmissions
    • Birgit Pfitzmann and Michael Waidner. A model for asynchronous reactive systems and its applications to secure message transmissions. In IEEE Symposium on Security and Privacy, 2001.
    • (2001) IEEE Symposium On Security and Privacy
    • Pfitzmann, B.1    Waidner, M.2
  • 29
    • 84904171659 scopus 로고    scopus 로고
    • In D.Hutter, W.Stephan, PTraverso, and M.Ullmann, editors, Applied Formal Methods - FM-Trends 98, Springer LNCS 1641
    • O. Slotosch. Quest: Overview over the Project. In D.Hutter, W.Stephan, PTraverso, and M.Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998.
    • (1998) Quest: Overview Over the Project , pp. 346-350
    • Slotosch, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.