Abstract
Future networks will be open, heterogeneous and complex systems consisting of many independent nets. Classical services like e-mail and file-transfer will only be components of these information networks, which resemble more social rather than technical infrastructures. While the technical development is predictable, the social and economic direction is less clear. Security is a key factor (Schoder et al., 1998). It is, however, no longer limited to the protection from physical dangers, but rather the ability to protect virtual assets and privacy. As in any human communication, it should be seen as an element of technical communication and is a matter to be negotiated between partners. This paper describes multilateral security (Rannenberg et al., 1996) as the requirement to act self-determinedly in a global network and relates the social term “trust” and the technical term “security”. While the functions of technology are all related to cryptography, infrastructures enable communication and institutions have the task of assuring trust in functions and promises of infrastructures. Even though governments may have to change their policy towards regulation, a realm of regulations in providing future infrastructures may remain. This paper elaborates on concepts and ideas of the Kolleg “Sicherheit in der Kommunkationstechnik” (Müller et al., 1997, 1998), supported by the Gottlieb Daimler- und Karl Benz-Stiftung, Ladenburg-Berlin.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abelson, H. et al. (1997) The Risks of Key Recovety, Key Escrow, and Third party Enctyption. http://theory,ics.mit.edu/
Cheswick, W. R. (1995) Firewalls and Internet Security. Add. Wesley, Reading
Deering, S. et al. (1995) Internet Protocol Version 6, RFC1883, December 1995
Fabre, J. (1996) FRIENDS: A Flexible Architecture for Implementing Fault Tolerant and Secure Distributed Applications. In: 2. Dependable Computing Conference, Italy, 1996
Federrath, H. et al. (1996) MIXES in Mobile Communication Systems, Location management with Privacy, Proc. Workshop on Information Hiding, Cambridge, UK, 1.6.96
Federrath, H. et al. (1997) Bausteine zur Realisierung mehrseitiger Sicherheit. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading
Grimm, R. (1997) Sicherheit fur offene Kommunikationsnetze. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading
Linn, J. (1993) Privacy Enhancement forInternet Electronic Mail, RFC 1421, February 1993
Müller, G., Kohl, U., Strauß, R. (1996) Zukunftsperspektiven der digitalen Vernetzung. dpunkt, Heidelberg
Müller, G., Kohl, U., Schoder, D. (1997) Unternehmenskommunikation: Telematiksysteme für vernetzte Unternehmen. Add. Wesley, Reading
Müller, G., Pfitzmann, A. (eds.) (1997) Mehrseitige Sicherheit in der Kommunikationstechnik, Verfahren, Komponenten, Integration, Bd 1. Add. Wesley, Reading
Müller, G., Stapf, K (eds.) (1998) Mehrseitige Sicherheit in der Kommunikationstechnik, Erwartung, Akzeptanz, Nutzung, Bd 2. Add. Wesley, Reading
Müller, G., Rannenberg, K (eds.) (1999) Multilateral Security — Technology, Infrastructure, Economy, Vol. 3. Add. Wesley, Reading
Rannenberg, K, Pfitzmann, A., Müller, G. (1996) Sicherheit, insbesondere mehrseitige ITSicherheit. In: Müller, G., Bunz, H. (Hrsg.) Schwerpunktheft “Sicherheit in der Kommunikationstechnik” in: Informationstechnik und Technische Informatik (it+ti) 38, Heft 4, August 1996: 7–10
Schoder, D., Strauß, R., Welchering, P. (1998) Electronic Commerce Enquete 1997/98. Empirische Studie zum betriebswirtschaftlichen Nutzen von Electronic Commerce rur Unternehmen im deutschsprachigen Raum, Stuttgart 1998
Schneier, B. (1995) Applied Cryptography. John Wiley, New York
Spar, D. et al. (1996) Ruling the Net. Harvard Business review, May-June 1996
Voydock, V. L. (1983) Security Mechanisms in High-Level Network Protocols. In: ACM Computing Surveys 15
Waidner, M. (1996) Development of a Secure Electronic Marketplace for Europe. In: ESORICS, Rome 1996. Springer, Berlin Heidelberg New York Tokyo (http://www.semper.org)
Westfeld, A. (1997) Steganographie am Beispiel einer Videokonferenz. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading
Wilhelm, U. G. et al. (1997) Sicherheit in Corba und TINA. In: Muller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading
Wolf, G. et al. (1997) Sicherheitsarchitekturen. In: Müller, G., Pfitzmann, A. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik. Add. Wesley, Reading
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Wien
About this chapter
Cite this chapter
Müller, G. (2001). Security in E-Commerce. In: Werthner, H., Bichler, M. (eds) Lectures in E-Commerce. Springer, Vienna. https://doi.org/10.1007/978-3-7091-6213-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-7091-6213-2_7
Publisher Name: Springer, Vienna
Print ISBN: 978-3-211-83623-1
Online ISBN: 978-3-7091-6213-2
eBook Packages: Springer Book Archive