Check out the new USENIX Web site. next up previous
Next: The registration procedure Up: A Resilient Access Control Previous: Analysis of Needham's Example

The Resilient On-line Transaction Scheme

We construct an on-line transaction scheme based on the analysis in the previous section. We define three procedures for access control and electronic transactions: a registration procedure, a transaction procedure, and a secret-revocation procedure. The principals in these transactions are a customer C, a merchant M, and a bank B. Merchants include Internet shopping malls, book sellers, on-line travel agents, news providers, etc.

We describe four procedures with brief protocol flows. In the protocol description, the notation tex2html_wrap_inline244 stands for protocols between A and B, tex2html_wrap_inline250 a message from A to B. The symbol := denotes an assignment. The notation (x,y) is the concatenation of x and y. Figure 1 shows the interfaces between the principals.

Principals and their interfaces
Figure 1: Principals and their interfaces




next up previous
Next: The registration procedure Up: A Resilient Access Control Previous: Analysis of Needham's Example

Jong-Hyeon Lee, Computer Laboratory, University of Cambridge, 1998.