Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > REVIEW: "Non-Repudiation in Electronic Commerce", Jianying Zhou

Thread Tools

REVIEW: "Non-Repudiation in Electronic Commerce", Jianying Zhou

Rob Slade, doting grandpa of Ryan and Trevor
Posts: n/a

"Non-Repudiation in Electronic Commerce", Jianying Zhou, 2001,
1-58053-247-0, U$89.00/C$131.95
%A Jianying Zhou
%C 685 Canton St., Norwood, MA 02062
%D 2001
%G 1-58053-247-0
%I Artech House/Horizon
%O U$89.00/C$131.95 617-769-9750 800-225-9977 fax: +1-617-769-6334
%P 200 p.
%T "Non-Repudiation in Electronic Commerce"

The preface outlines non-repudiation as a security service in its own
right, with supporting requirements, rather than an effect of another
security mechanism. This position is in rather interesting contrast
to most works that tag non-repudiation onto the list of functions that
can be accomplished by asymmetric (public key) cryptography: a
benefit, but a bit of an afterthought.

Chapter one gives us an introduction to the basics of non-repudiation,
in both electronic mail and electronic commerce. Various parties to a
transaction, the means, requirements, and forms of evidence all make
up the fundamentals of non-repudiation in chapter two. Digital
signatures are the traditional, but not the only way to prevent
repudiation of a transaction or message, and chapter three examines
four approaches for maintaining their validity. Chapter four
investigates the concept of fairness in a non-repudiation system,
ensuring that where the transaction is not completed neither side is
able to obtain an advantage over the other. In general, fairness
requires either gradual disclosure (in an ad hoc situation) or the
involvement of a trusted third party. Specific "Fair" protocols are
reviewed in chapter five. Chapter six looks at the ISO's
(International Standards Organization) non-repudiation mechanisms.
Case studies of the detailed requirements and proposed protocols for
an online lottery (which also involves anonymity) and mobile
(wireless) billing are in chapter seven. Chapter eight has a summary
of the main points in the book, and appendix A deals with formal
verification of non-repudiation.

A detailed and interesting account of a rather neglected but important

copyright Robert M. Slade, 2003 BKNNRPDT.RVW 20031205

====================== Removed) (E-Mail Removed) (E-Mail Removed)
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
============= for back issues:
[Base URL] site
or mirror
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
[Base URL]review.htm
Security Educ.:
Review mailing list: send mail to (E-Mail Removed)
or (E-Mail Removed)

Reply With Quote

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
Electronic Assessment program- Windows 2000 Prof. Microsoft Certification 3 08-15-2005 06:44 AM
Electronic Design Processes 2005: Call For Papers VHDL 0 01-25-2005 03:52 AM
electronic certifications catalog Chris Martin Microsoft Certification 2 05-14-2004 05:24 PM
Electronic Software Delivery (ESD) using .Net Mike ASP .Net 0 11-13-2003 09:09 PM
MCAD/MCSD.NET Self-Paced Training Kit 4 Electronic Books xiaoling Feng MCSD 5 10-13-2003 04:22 PM