Skip to main content

Security Certification Model for Mobile-Commerce

  • Conference paper
  • 846 Accesses

Part of the Studies in Computational Intelligence book series (SCI,volume 496)

Abstract

The most important technology in the mobile commerce based on mobile applications is to guarantee the certification and security of trading information exchange. Many technologies are proposed as a standard to support this security problem. M(Mobile)-commerce is a new area arising from the marriage of electronic commerce with emerging mobile and pervasive computing technology. The newness of this area and the rapidness with which it is emerging makes it difficult to analyze the technological problems that mcommerce introduces and, in particular, the security and privacy issues. This situation is not good, since history has shown that security is very difficult to retro-fit into deployed technology, and pervasive m-commerce promises to permeate and transform even more aspects of life than e-commerce and the Internet has. One of them is an XML (eXtensible Markup Language). This is used in various applications as the document standard for electronic commerce system. The XML security has become very important topic. In this paper, we propose the XML security model for mobile commerce services based electronic commerce system to guarantee the secure exchange of trading information. To accomplish the security of XML, the differences of XML signature, XML encryption and XML key management scheme respect to the conventional system should be provided. The new architecture is proposed based on unique characteristics of mobile commerce on XML. Especially the method to integrate the process management system need to the electronic commerce is proposed.

Keywords

  • Mobile commerce
  • Mobile security
  • XML management
  • Mobile
  • networks

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-00948-3_1
  • Chapter length: 15 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   119.00
Price excludes VAT (USA)
  • ISBN: 978-3-319-00948-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   159.99
Price excludes VAT (USA)
Hardcover Book
USD   249.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Napster.com home page, http://www.napster.com

  2. Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security Issues in M-Commerce: A Usage-Based Taxonomy. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol. 2033, pp. 264–282. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  3. RFC: 2560 X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP (1996)

    Google Scholar 

  4. W3C, Extensible Markup Language (XML) (1998), http://www.w3c.org/XML

  5. XML Signature Requirements WD, W3C Working Draft (October 1999), http://www.w3.org

  6. Cho, K.M.: Framework of Content Distribution in Mobile Network Environment. In: Proc. the 2003 International Conference on Internet Computing (IC 2003), pp. 429–434 (2003)

    Google Scholar 

  7. http://www.roseindia.net/services/m-commerce/mobile-commerce.shtml

  8. XML-Signature Syntax and Processing, W3C Recommendation (February 2002), http://www.w3c.org

  9. XML Encryption Syntax and Processing, W3C Working Draft (October 2001), http://www.w3c.org

  10. Decryption Transform for XML Signature, W3C Working Draft (October 2001), http://www.w3c.org

  11. Takase, T., et al.: XML Digital Signature System Independent Existing Applications. In: Proc. the 2002 Symposium on Application and the Internet, pp. 150–157 (2002)

    Google Scholar 

  12. Xavier, E.: XML based Security for E-Commerce Applications. In: Eighth Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, pp. 10–17 (2001)

    Google Scholar 

  13. Cho, K.M.: Packaging Strategies of Multimedia Content in DRM. In: Proc. the 2003 International Conference on Internet Computing (IC 2003), pp. 243–248 (2003)

    Google Scholar 

  14. Cho, K.M.: Web Services based XML Security Model for Secure Information Exchange in Electronic Commerce. The Journal of Korean Association of Computer Education 7(5), 93–99 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haeng-Kon Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kim, HK. (2014). Security Certification Model for Mobile-Commerce. In: Lee, R. (eds) Software Engineering Research, Management and Applications. Studies in Computational Intelligence, vol 496. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-00948-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-00948-3_1

  • Publisher Name: Springer, Heidelberg

  • Print ISBN: 978-3-319-00947-6

  • Online ISBN: 978-3-319-00948-3

  • eBook Packages: EngineeringEngineering (R0)