To read this content please select one of the options below:

Seamless secured transactions

Carrie Liddy (Daruma Management Services, Toronto, Ontario, Canada)
Alice Sturgeon (A&R Sturgeon Consulting Services, North Gower, Ontario, Canada)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 March 1998

675

Abstract

Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self‐signed certification authorities. Depicts the relevant layers of interactions each option entails. Explains the structures of proprietary keying systems and of hierarchical certification authorities. Addresses the geopolitical elements ‐ especially policy and procedures, and national legal frameworks ‐ required to effectively implement the trust that secure transactions require.

Keywords

Citation

Liddy, C. and Sturgeon, A. (1998), "Seamless secured transactions", Information Management & Computer Security, Vol. 6 No. 1, pp. 21-27. https://doi.org/10.1108/09685229810207416

Publisher

:

MCB UP Ltd

Copyright © 1998, MCB UP Limited

Related articles