• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. A formal IT-security model for a weak fair-exchange cooperation with non-repudiation proofs
 
  • Details
  • Full
Options
2009
Conference Paper
Title

A formal IT-security model for a weak fair-exchange cooperation with non-repudiation proofs

Abstract
This article presents a formal IT-security model for the step-by-step exchange of digital items. Following the taxonomy of Asokan the model presented here addresses the security requirements for a so-called ldquoweakrdquo fair exchange. ldquoWeakrdquo refers to the fact, that third parties are used to dissolve disputes. In this model, non-repudiation proofs are used in an external dispute to establish weak fairness. It shows how many unproved steps can be tolerated by one party without loss of fairness. The model is based on the idea of a ldquocontinuous balance of obligations and their proofsrdquo. This idea was proposed 1993 by Grimm, but never since formalized properly.
Author(s)
Grimm, R.
Mainwork
Third International Conference on Emerging Security Information, Systems, and Technologies, SECURWARE 2009. Proceedings  
Conference
International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE) 2009  
DOI
10.1109/SECURWARE.2009.15
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024