Cover image for Secure electronic commerce : building the infrastructure for digital signatures and encryption
Title:
Secure electronic commerce : building the infrastructure for digital signatures and encryption
Personal Author:
Edition:
2nd ed.
Publication Information:
Upper Saddle River, N.J. : Prentice Hall, 2001
ISBN:
9780130272768
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004531764 QA76.9.A25 F67 2001 Open Access Book Book
Searching...
Searching...
30000005167725 QA76.9.A25 F67 2001 Open Access Book Book
Searching...

On Order

Summary

Summary

Co-authored by the leading e-commerce security specialist and a leading legal specialist in e-commerce, this book offers a complete blueprint showing companies how to implement state-of-the-art e-commerce while minimizing all the security risks involved. This new edition has been completely updated to reflect today's latest developments in digital signatures, public-key infrastructure, EDI technical standards, certification, and authentication. The book begins by introducing the underlying technologies and inherent risks of electronic commerce. It considers the role of computer networks, the Internet, EDI and email, and the challenges of ensuring that electronic transactions are resistant to fraud, traceable, and legally binding in all jurisdictions. From network security to cryptography and today's latest secure Web and messaging protocols, all of today's latest security technologies are explained in detail, from a business perspective, in language non-specialists can easily understand.


Author Notes

Warwick Ford, M.E., Ph.D., is Vice President for Strategic Technologies and Chief Technology Officer at VeriSign, Silicon Valley's premiere provider of identity, security, and payment services for e-commerce.

Michael Baum, J.D., M.B.A., CISSP, is Vice President for Practices and External Affairs at VeriSign.


Excerpts

Excerpts

Preface Our entry into the twenty-first century has been accompanied by the emergence of electronic commerce (e-commerce) as both an enabler and a component of business reengineering. E-commerce offers great rewards for all who embrace it. However, it also brings considerable risks for the unwary. While new technologies, with their complexities and explosive adoption rates, can be largely blamed for creating these new risks, new technologies also represent a large part of the solution, in managing and mitigating these risks. The latter technologies include, in particular, digital signatures and public-key cryptography. However, achieving secure electronic commerce requires much more than the mere application of such core technologies. It also depends upon interdependent technological, business, and legal infrastructures that are needed to enable the use of these core technologies on a large scale. Our goal in this book is to describe the ingredients and recipe for making e-commerce secure, with emphasis on the role, practical deployment, and use of these infrastructures. Why have an engineer and a lawyer teamed up to write this book? The answer is that secure e-commerce can only be achieved through a delicate interweaving of technological safeguards and legal controls. The most critical issues cannot be understood by studying either the technological or legal aspects in isolation. Therefore, an effective treatise on this subject must draw on both technological and legal expertise. This book is targeted at a broad audience, including business professionals, information technologists, and lawyersÑanyone who is concerned about the security of e-commerce. Readers are not expected to have substantive technological or legal backgrounds. To make this book valuable to businesspersons, consumers, bankers, product developers, service providers, legal counsel, policymakers, and students alike, we include introductory material to virtually all topics, with a view to bringing all readers up to a base knowledge threshold before addressing the more complex issues. Since the first edition was published, there has been enormous progress in the field of secure e-commerce. While the core technologies have not changed materially, there have been significant advances in software tools and packaging, standards, legislation globally, and experience in applying the technologies described in the first edition to real-world e-commerce. In the standards arena, for example, we have seen the completion and widespread adoption of the S/MIME secure messaging specifications, IPsec virtual private network specifications, and IETF PKIX specifications for public-key infrastructure. Notable legislative activities have included diverse national and state digital signature laws, and the U.S. Federal E-Sign Act. There has also been solid progress on the assessment and accreditation of secure e-commerce infrastructure components, such as certification authorities. These advances have occurred in conjunction with a massive increase in e-commerce deployment generally, in particular, the rapid emergence of business-to-business Internet commerce. Consequently, in this edition we have focused more on those aspects of the field that are proving most important in todayÕs marketplace and that require rigorous analysis to ensure successful deployment. We have written this book with an international audience in mind. However, the reader will observe, especially in our coverage of practices and legal issues, a predominance of coverage from the U.S. perspective. In general, we believe the problems faced globally are much the same as those faced in the United States, so we anticipate that our coverage of problems and progress in the United States will map meaningfully to developments in other nations. If we sometimes fall short in this respect, we apologize to our international colleagues. Excerpted from Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption by Warwick Ford, Michael S. Baum All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Table of Contents

Forewordsp. xv
Prefacep. xxiii
Chapter 1 Introductionp. 1
1.1 The Upsidep. 2
1.2 The Downsidep. 3
1.3 E-Commerce Compared with Paper-Based Commercep. 5
1.4 Making E-Commerce Securep. 6
1.5 Book Road Mapp. 8
Chapter 2 The Internetp. 11
2.1 Computer Networkingp. 11
2.2 Internet Applicationsp. 16
2.3 The Internet Communityp. 19
2.4 Internet Commercep. 26
2.5 Example Transaction Scenariosp. 30
2.6 Summaryp. 32
Chapter 3 Business and Legal Principlesp. 39
3.1 The Electronic Commerce Transactionp. 40
3.2 Creating a Binding Commitmentp. 41
3.3 Validity and Enforceability of Agreementsp. 44
3.4 Enforcementp. 52
3.5 Other Legal Issuesp. 56
3.6 Dealing with Legal Uncertaintiesp. 64
3.7 Two Business Modelsp. 67
3.8 Business Controls in a Digital Environmentp. 69
3.9 Summaryp. 70
Chapter 4 Information Security Technologiesp. 93
4.1 Information Security Fundamentalsp. 93
4.2 Introduction to Cryptographyp. 101
4.3 Digital Signaturesp. 109
4.4 Key Managementp. 114
4.5 Authenticationp. 120
4.6 System Trustp. 132
4.7 Summaryp. 133
Chapter 5 Internet Securityp. 141
5.1 Segmenting the Problemp. 141
5.2 Firewallsp. 146
5.3 IPsec and Virtual Private Networksp. 147
5.4 Web Security with SSL/TLSp. 152
5.5 Other Web Security Protocolsp. 157
5.6 Secure Messaging and S/MIMEp. 160
5.7 Other Messaging Security Protocolsp. 167
5.8 Secure Payments on the Internetp. 168
5.9 Summaryp. 173
Chapter 6 Certificatesp. 181
6.1 Introduction to Public-Key Certificatesp. 181
6.2 Public-Private Key-Pair Managementp. 187
6.3 Certificate Issuancep. 191
6.4 Certificate Distributionp. 196
6.5 X.509 Certificate Formatp. 198
6.6 Certificate Revocationp. 216
6.7 X.509 Certificate Revocation Listp. 226
6.8 Key-Pair and Certificate Validity Periodsp. 235
6.9 Certificate Formats Other than X.509p. 238
6.10 Certification of Authorization Informationp. 238
6.11 Summaryp. 243
Chapter 7 Public-Key Infrastructurep. 251
7.1 PKI for the Typical E-Commerce Enterprisep. 251
7.2 Certification Authority Structures: Traditional Modelsp. 253
7.3 Certification Authority Structures: The Generalized Modelp. 259
7.4 Certificate Policiesp. 263
7.5 Name Constraintsp. 269
7.6 Certificate Management Protocolsp. 271
7.7 PGP's Web of Trustp. 275
7.8 Some Multienterprise PKI Examplesp. 277
7.9 Pragmatics of PKI Interoperation and Community Buildingp. 284
7.10 Summaryp. 285
Chapter 8 Legislation, Regulation, and Guidelinesp. 289
8.1 General E-Commerce Legislation and Regulationp. 290
8.2 Digital Signature Lawsp. 302
8.3 General E-Commerce Guidelinesp. 310
8.4 PKI-Related Standards and Guidelinesp. 311
8.5 Summaryp. 317
Chapter 9 Non-repudiationp. 333
9.1 Concept and Definitionp. 333
9.2 Types of Non-repudiationp. 337
9.3 Activities and Rolesp. 342
9.4 Mechanisms for Non-repudiation of Originp. 346
9.5 Mechanisms for Non-repudiation of Deliveryp. 351
9.6 Trusted Third Partiesp. 353
9.7 Dispute Resolutionp. 361
9.8 Summaryp. 365
Chapter 10 Certification Policies and Practicesp. 385
10.1 Conceptsp. 385
10.2 CP and CPS Topics: Introduction of a CP or CPSp. 393
10.3 CP and CPS Topics: General Provisionsp. 395
10.4 CP and CPS Topics: Identification and Authenticationp. 404
10.5 CP and CPS Topics: Operational Requirementsp. 407
10.6 CP and CPS Topics: Physical, Procedural, and Personnel Security Controlsp. 414
10.7 CP and CPS Topics: Technical Security Controlsp. 416
10.8 CP and CPS Topics: Certificate and CRL Profilesp. 418
10.9 CP and CPS Topics: Specification Administrationp. 419
10.10 Systematizing CP and CPS Developmentp. 420
10.11 Summaryp. 421
Chapter 11 Public-Key Infrastructure Assessment and Accreditationp. 433
11.1 The Role of Assessment in Public-Key Infrastructurep. 434
11.2 Evolution of Information System Assessment Criteriap. 442
11.3 Noteworthy Assessment and Accreditation Schemesp. 447
11.4 Rationalization of Assessment Schemesp. 459
11.5 Summaryp. 460
Appendix A Forms of Agreementp. 471
Appendix B The U.S. Federal E-Sign Actp. 489
Appendix C ASN.1 Notationp. 503
Appendix D X.509 in ASN.1 Notationp. 511
Appendix E United Nations Model Law on Electronic Commercep. 541
Appendix F How to Obtain Referenced Documentsp. 551
Appendix G Legacy Application Security Standardsp. 555
Appendix H PKI Disclosure Statementp. 561
Appendix I Repudiation In Lawp. 563
Appendix J Public-Key Cryptosystemsp. 569
Appendix K European Signature Directivep. 589
Indexp. 595