Skip to main content

Model-Based Analysis of Money Accountability in Electronic Purses

  • Conference paper
Internet and Network Economics (WINE 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3828))

Included in the following conference series:

  • 1946 Accesses

Abstract

The Common Electronic Purse Specifications (CEPS) define requirements for all components needed by an organization to implement a globally interoperable electronic purse program. In this paper we describe how we model purchase transaction protcol in CEPS using formal specification language. We define and verify the money accountability property of the CEPS, and we address its violation scenario in the presence of communication network failures. Using model checking technique we find that transaction record stored in the trusted-third party plays a essential role in satisfying the accountability property.

This work was supported by Korea Research Foundation Grant (KRF-2003-003-D00397).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CEPSCO, Common Electronic Purse Specification, Business Requirements vers. 7.0, Functional Requirements vers. 6.3, Technical Specification vers.2.2 (2000), http://www.cepsco.com

  2. Cox, B., Tygar, J.D., Sirbu, M.: NetBill Security and Transaction Protocol. In: Proceedings of the First USENIX Workshop in Electronic Commerce, July 1995, pp. 77–88 (1995)

    Google Scholar 

  3. Heintze, N., Tygar, J., Wing, J., Wong, H.: Model Checking Electronic Commerce Protocols. In: Adam, N.R., Yesha, Y. (eds.) Electronic Commerce 1994. LNCS, vol. 1028, pp. 146–164. Springer, Heidelberg (1996)

    Google Scholar 

  4. Flat, A., Chaaum, D., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 200–212. Springer, Heidelberg (1990)

    Google Scholar 

  5. Kim, I.G., Kim, H.S., Lee, J.Y., Choi, J.Y.: Analysis and Modification of ASK Mobile Security Protocol. In: Proceedings of the Second IEEE International Workshop on Mobile Commerce and Services, July 2005, pp. 79–83 (2005)

    Google Scholar 

  6. Jürjens, J., Wimmel, G.: Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications. In: Proceedings of the IFIP conference on towards the E-society, pp. 489–506 (2001)

    Google Scholar 

  7. Ray, I., Ray, I.: Failure Analysis and E-commerce Protocol using Model Checking. In: Proceedings of the Second International Workshop on Advanced Issues of E-Commerce and Web-based Information Systems, June 2000, pp. 176–183 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, IG., Moon, YJ., Kang, I., Lee, JY., Han, KH., Choi, JY. (2005). Model-Based Analysis of Money Accountability in Electronic Purses. In: Deng, X., Ye, Y. (eds) Internet and Network Economics. WINE 2005. Lecture Notes in Computer Science, vol 3828. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11600930_34

Download citation

  • DOI: https://doi.org/10.1007/11600930_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30900-0

  • Online ISBN: 978-3-540-32293-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics