Abstract
The typical business transaction requires up to three kinds of actors: Customers, service providers and banks. There may be several of each involved in a full transaction, e.g. an acquiring bank, the bank of the service provider, or seller, and a issuing bank, the bank of the customer, or buyer. This assumes that an infrastructure exists, which enables these three different entities to communicate together and recognise each other as legal entities with appropriate registered public keys.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Bibliography
LEGAL ASPECTS OF TRADE DATA INTERCHANGE: Report on Action Programme relating to Commercial and Legal Aspects of Trade Facilitation. TRADE/WP.4/R.781.
Legal aspects of trade data interchange Action Programme relating to Commercial and Legal aspects of Trade Facilitation. TRADE/WP.4/R.1818, February 17, 1992.
Legal aspects of trade data interchange Review of definitions of “Writing”, “Signature” and “Document” Employed in Multilateral Conventions and Agreements Relating to International Trade. TRADE/WP.4/R.819/March 9, 1992.
Security on Open Environments. TEDIS II B71993
Digital Signatures in EDIFACT-TEDIS, 1990
The Green Book, INFOSEC, ver. 4.0, 1994.
TEDIS II B5, Legal aspects of Authentication, storage and coding, 1994.
FAST, First Attempt to Secure Trade, TEDIS II project 1994–1996
BOLERO, Bills of Lading for EuROpe, Grand scale INFOSEC pilot, 1994–5
SEMPER, Secure Market Place for EuRope, ACTS 1995
Trusted Third Parties and Similar Services, TEDIS 1991.
Trusted Third Parties, INFOSEC report, 1993.
SAM, Secure Administration Key Management, TEDIS (Cryptomathic).
Walter Fumy and Peter Landrock, Principles of Key Management, IEEE Journal on selected Ares in Communication, Vol. 11 No. 5, June 93.
SET, Secure Electronic Trade, Europay, Mastercard, Visa
A.M. Froomkin, The Essential Role of Trusted Third Parties in Electronic Commerce
The Verisign Certification Practice Statement (see http://www.verisign.com)
Peter Landrock, Practical Experiences with TTP Schemes, Information Security Technical Report, Elsevier, ed. By Gary Hardy, Vol. 1, No. 1, 1996.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Landrock, P. (1998). TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_11
Download citation
DOI: https://doi.org/10.1007/3-540-49248-8_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65474-2
Online ISBN: 978-3-540-49248-1
eBook Packages: Springer Book Archive