skip to main content
article

WebALPS: a survey of E-commerce privacy and security applications

Authors Info & Claims
Published:01 June 2001Publication History
Skip Abstract Section

Abstract

Web-based commerce is rife with scenarios where a party needs to trust properties of computation and data storage occurring at a remote machine, operated by a different party with different interests. In our WebALPS project, we have used off-the-shelf hardware and open source software to build trusted co-servers co-resident with Web servers, and bring the secure SSL channel all the way into these trusted co-servers. In this paper, we survey how this tool can be used to systematically address privacy and security issues in e-commerce.

References

  1. Arbaugh, W. A., Farber, D., and Smith, J. M. 1997. A secure and reliable bootstrap architecture. In Security and Privacy (1997). IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Freier, A. O., Karlton, P., and Kocher, P. C. 1996. The ssl protocol version 3.0. http://home.netscape.com/eng/ssl3/draft302.txt.Google ScholarGoogle Scholar
  3. IBM. 2000. Ibm 4758 models 2 and 23 pci cryptographic coprocessor. Product Brochure G221-9091-02. http://www.ibm.com/security/cryptocards/.Google ScholarGoogle Scholar
  4. Jiang, S. 2001. Webalps implementation and performance analysis: Using trusted co-servers to enhance privacy and security of web interactions. Master's thesis, Department of Computer Science, Dartmouth College. (Available as Technical Report TR2001-399). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jiang, S., Smith, S., and Minami, K. 2001. Securing web servers against insider attack. In Annual Computer Security Applications Conference (December 2001). ACSA/ACM. (A preliminary version is availabe as Technical Report TR2001-410, Dartmouth College.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Knop, E. 2001. Secure public-key services for web-based mail. Senior thesis, Department of Computer Science, Dartmouth College.Google ScholarGoogle Scholar
  7. NIST. 1994. Security requirements for cryptographic modules. Federal Information Processing Standards Publication 140-1.Google ScholarGoogle Scholar
  8. Smith, S. 2001. Outbound authentication for programmable secure coprocessors. Technical Report TR2001-401 (March), Department of Computer Science, Dartmouth College. http://www.cs.dartmouth.edu/~pkilab/oatr.pdf.Google ScholarGoogle Scholar
  9. Smith, S., Perez, R., Weingart, S., and Austel, V. 1999. Validating a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference (October 1999). National Institute of Standards and Technology.Google ScholarGoogle Scholar
  10. Smith, S. and Safford, D. 2001. Practical server privacy using secure coprocessors. IBM Systems Journal 40, 3. (Special Issue on End-to-End Security). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Smith, S. and Weingart, S. 1999. Building a high-performance, programmable secure coprocessor. Computer Networks 31, 831-860. Special Issue on Computer Network Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yee, B. 1994. Using Secure Coprocessors. Ph. D. thesis, School of Computer Science, Carnegie Mellon University. (Available as Technical Report CMU-CS-94-149.).Google ScholarGoogle Scholar
  13. Yuan, Y., Ye, E., and Smith, S. 2001. Web spoofing 2001. Technical Report TR2001-409 (July), Department of Computer Science, Dartmouth College. http://www.cs.dartmouth.edu/~pkilab/demos/spoofing/.Google ScholarGoogle Scholar

Index Terms

  1. WebALPS: a survey of E-commerce privacy and security applications

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in

                      Full Access

                      • Published in

                        cover image ACM SIGecom Exchanges
                        ACM SIGecom Exchanges  Volume 2, Issue 3
                        Summer, 2001
                        41 pages
                        EISSN:1551-9031
                        DOI:10.1145/844324
                        Issue’s Table of Contents

                        Copyright © 2001 Copyright is held by the owner/author(s)

                        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                        Publisher

                        Association for Computing Machinery

                        New York, NY, United States

                        Publication History

                        • Published: 1 June 2001

                        Check for updates

                        Qualifiers

                        • article

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader