Skip to main content

New E-Payment Scenarios in an Extended Version of the Traditional Model

  • Conference paper
Book cover Computational Science and Its Applications – ICCSA 2008 (ICCSA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5073))

Included in the following conference series:

Abstract

Most of the security proposals in commerce scenarios have been based on a classical e-payment system definition. This definition basically represents a client who sends a payment order to obtain some goods/services from the merchant, which the intentions of the real money transaction carry on between his financial institutions. Nevertheless, these definitions are not sufficiently robust when new aspects appear in the electronic payment transaction. We can identify some of those new aspects (such as: smart card with network capabilities, business mediator with advantage services, handheld devices with constrained connectivity, and multiparty scenarios) that could subordinate the design of current and future commerce scenarios. In this paper we extended the traditional e-payment system definition, in order to include these new aspects. Additionally, we describe two new payment models, where such aspects are involved, and where the secure solution needs to consider new security requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kungpisdan, S.: Modelling, design, and analysis of Secure Mobile Payment Systems., Thesis for Doctor of Philosophy, Faculty of Information Technology, Monash University (2005), http://beast.csse.monash.edu.au/~srini/theses/keng.pdf

  2. 3-D Secure. System Overview. 70015-01 External Version Copyright © 2002-2003. Visa International Version 1.0.2 (May 01, 2003), http://partnernetwork.visa.com/pf/3dsec/download/trk_3dsec_system_overview_v102.pdf

  3. Kou, W.: Payment technologies for e-commerce. Springer, Heidelberg (2003)

    Google Scholar 

  4. O’Mahony, D.: Electronic payment systems for e-commerce. Artech House (2001)

    Google Scholar 

  5. Secure system to pay with mobile phone charging the amount directly to a payment card, http://www.mobipay.com

  6. Secure online payment gateway: PayPal, www.paypal.com

  7. Payment gateway: Authorize.Net, http://www.authorizenet.com/

  8. Rees, J., Honeyman, P.: Webcard: a Java Card web server. In: Proc. of 4th IFIP Smart Card Research and Advanced Application Conference, CARDIS 2000, Bristol, U.K (2000)

    Google Scholar 

  9. Urien, P.: Internet card, a smart card as a true Internet node. Computer Communications 23(17), 1655–1666 (2000)

    Article  Google Scholar 

  10. Postel, J.: Transmission Control Protocol. IETF RFC 079 (September 1981)

    Google Scholar 

  11. IST Project RESET, Roadmap for European Research on Smartcard related Technologies, IST-2001-39046: Final Roadmap, v.5 (May 2003)

    Google Scholar 

  12. Montgomery, M., Ali, A., Lu, H.K.: Secure Network Card. Implementation of a Standard Network Stack in a Smart Card. In: Proc. of 4th IFIP Smart Card Research and Advanced Application Conference, CARDIS 2004, Toulouse, France, August 23-26, 2004. Kluwer Academic Publishers, Dordrecht (2004)

    Google Scholar 

  13. Lu, H.K.: New Advances in Smart Card Communications, International Conference on Computing. In: Communications and Control technologies (CCCT), Austin, TX, USA, August 14-17 (2004)

    Google Scholar 

  14. Lu, H.K., Ali, A.: Prevent On-line Identity Theft - Using Network Smart Cards for Secure On-line Transactions. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225. Springer, Heidelberg (2004)

    Google Scholar 

  15. Ali, A., Lu, K., Montgomery, M.: Network Smart Card: A New Paradigm of Secure On-line Transactions. In: Proc. of Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), Chiba, Japan, May 30 - June 1 (2005)

    Google Scholar 

  16. Torres, J., Izquierdo, A., Sierra, J.M.: Advances in network smart cards authentication. Computer Networks 51(9), 2249–2261 (2007)

    Article  Google Scholar 

  17. Torres, J., Izquierdo, A., Sierra, J.M., Ribagorda, A.: Towards selfauthenticable smart cards. Computer Communications 29(15), 2781–2787 (2006)

    Article  Google Scholar 

  18. Porter, M.: Strategy and the Internet. Harvard Business Review, 63–78 (March 2001)

    Google Scholar 

  19. Giaglis, G., Klein, S., O’Keefe, R.: The role of intermediaries in electronic marketplaces: developing a contingency model. Information Systems Journal 12(3), 231 (2002)

    Article  Google Scholar 

  20. Dikaiakos, M.: Intermediary infrastructures for the World Wide Web. Computer Networks 45(4), 421–447 (2004)

    Article  Google Scholar 

  21. Esparza, O., Muñoz, J., Soriano, M., Forné, J.: Secure brokerage mechanisms for mobile electronic commerce. Computer Communications 29(12), 2308–2321 (2006)

    Article  Google Scholar 

  22. Bhargava, H., Choudhary, V.: Economics of an Information Intermediary with Aggregation Benefits. Information Systems Research 15(1), 22–36 (2004)

    Article  Google Scholar 

  23. Bhargava, H., Choudhary, V.: Economics of an Information Intermediary with Aggregation Benefits. Information Systems Research 15(1), 22–36 (2004)

    Article  Google Scholar 

  24. Wang, Y., Varadharajan, V.: A mobile autonomous agent-based secure payment protocol supporting multiple payments. In: IAT 2005, pp. 88–94 (2005)

    Google Scholar 

  25. Carbonell, M., Sierra, J., Torres, J., Izquierdo, A.: Security analysis of a new multi-party payment protocol with intermediary service. In: DEXA Workshops 2007, pp. 698–702 (2007)

    Google Scholar 

  26. Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security Issues in MCommerce: An Usage-Based Taxonomy. In: Proceedings of E-Commerce Agents, pp. 264–282 (2001)

    Google Scholar 

  27. Tellez Isaac, J., Sierra Cámara, J.M.: Anonymous Payment in a Client Centric Model for Digital Ecosystems. In: Proceedings of IEEE International Digital Ecosystems and Technologies (DEST), Australia (2007)

    Google Scholar 

  28. Tellez, J., Sierra, J.M., Izquierdo, A., Torres, J.: Anonymous Payment in a Kiosk Centric Model using Digital signature scheme with message recovery and Low Computional Power Devices. Journal of Theorical and Applied Electronic Commerce Research 1(2), 1–11 (2006)

    Google Scholar 

  29. Bartelt, A., Lamersdorf, W.: A multi-criteria taxonomy of business models in electronic commerce. In: Fiege, L., Mühl, G., Wilhelm, U.G. (eds.) WELCOM 2001. LNCS, vol. 2232, pp. 193–205. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  30. Rappa, M.: Business models on the web. Managing the digital enterprise(October 2006), http://digitalenterprise.org/models/models.html

  31. Stallings, W.: Cryptography and network security: principles and practices, ch. 16-20. Prentice Hall, Englewood Cliffs (2006)

    Google Scholar 

  32. Tsiakis, T., Stheohanidews, G.: The concept f security and trust in electronic payments. Computer & Security 24(1), 10–15 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Beniamino Murgante Antonio Laganà David Taniar Youngsong Mun Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Carbonell, M., Torres, J., Izquierdo, A., Suarez, D. (2008). New E-Payment Scenarios in an Extended Version of the Traditional Model. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2008. ICCSA 2008. Lecture Notes in Computer Science, vol 5073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69848-7_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69848-7_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69840-1

  • Online ISBN: 978-3-540-69848-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics