TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View

  • Peter Landrock
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1528)


The typical business transaction requires up to three kinds of actors: Customers, service providers and banks. There may be several of each involved in a full transaction, e.g. an acquiring bank, the bank of the service provider, or seller, and a issuing bank, the bank of the customer, or buyer. This assumes that an infrastructure exists, which enables these three different entities to communicate together and recognise each other as legal entities with appropriate registered public keys.


Security Service Electronic Commerce Certification Authority Security Domain Independent Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    LEGAL ASPECTS OF TRADE DATA INTERCHANGE: Report on Action Programme relating to Commercial and Legal Aspects of Trade Facilitation. TRADE/WP.4/R.781.Google Scholar
  2. [2]
    Legal aspects of trade data interchange Action Programme relating to Commercial and Legal aspects of Trade Facilitation. TRADE/WP.4/R.1818, February 17, 1992.Google Scholar
  3. [3]
    Legal aspects of trade data interchange Review of definitions of “Writing”, “Signature” and “Document” Employed in Multilateral Conventions and Agreements Relating to International Trade. TRADE/WP.4/R.819/March 9, 1992.Google Scholar
  4. [4]
    Security on Open Environments. TEDIS II B71993Google Scholar
  5. [5]
    Digital Signatures in EDIFACT-TEDIS, 1990Google Scholar
  6. [6]
    The Green Book, INFOSEC, ver. 4.0, 1994.Google Scholar
  7. [7]
    TEDIS II B5, Legal aspects of Authentication, storage and coding, 1994.Google Scholar
  8. [8]
    FAST, First Attempt to Secure Trade, TEDIS II project 1994–1996Google Scholar
  9. [9]
    BOLERO, Bills of Lading for EuROpe, Grand scale INFOSEC pilot, 1994–5Google Scholar
  10. [10]
    SEMPER, Secure Market Place for EuRope, ACTS 1995Google Scholar
  11. [11]
    Trusted Third Parties and Similar Services, TEDIS 1991.Google Scholar
  12. [12]
    Trusted Third Parties, INFOSEC report, 1993.Google Scholar
  13. [13]
    SAM, Secure Administration Key Management, TEDIS (Cryptomathic).Google Scholar
  14. [14]
    Walter Fumy and Peter Landrock, Principles of Key Management, IEEE Journal on selected Ares in Communication, Vol. 11 No. 5, June 93.Google Scholar
  15. [15]
    SET, Secure Electronic Trade, Europay, Mastercard, VisaGoogle Scholar
  16. [16]
    A.M. Froomkin, The Essential Role of Trusted Third Parties in Electronic CommerceGoogle Scholar
  17. [17]
    The Verisign Certification Practice Statement (see
  18. [18]
    Peter Landrock, Practical Experiences with TTP Schemes, Information Security Technical Report, Elsevier, ed. By Gary Hardy, Vol. 1, No. 1, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Peter Landrock
    • 1
  1. 1.Cryptomathic A/SUSA

Personalised recommendations