Designing Secure E-Tendering Systems

  • Rong Du
  • Ernest Foo
  • Juan González Nieto
  • Colin Boyd
Conference paper

DOI: 10.1007/11537878_8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3592)
Cite this paper as:
Du R., Foo E., Nieto J.G., Boyd C. (2005) Designing Secure E-Tendering Systems. In: Katsikas S., López J., Pernul G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg

Abstract

Security requirements for e-tendering systems have not been closely scrutinised in the literature. This paper identifies key issues to be addressed in the design of secure e-tendering systems. In particular, the issues of secure timing and record keeping are raised. This paper also classifies existing e-tendering system designs by presenting common e-tendering architectures. A new e-tendering architecture, using distributed trusted third parties is proposed which may be suitable for secure large scale operations.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Rong Du
    • 1
  • Ernest Foo
    • 1
  • Juan González Nieto
    • 1
  • Colin Boyd
    • 1
  1. 1.Information Security Institute (ISI) 

Personalised recommendations