Wang, Hua and Cao, Jinli and Zhang, Yanchun (2003) A flexible payment scheme and its permission-role assignment. In: 26th Australasian Computer Science Conference (ACSC2003), 4-7 Feb 2003, Adelaide, Australia.
|HTML Citation||EndNote||Dublin Core||Reference Manager|
Full text available as:
|PDF (Published Version) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader|
A flexible payment scheme and its permission-role assignments are proposed in this paper. The scheme uses electronic cash for payment transactions. In this protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities. A role called anonymity provider agent (AP) provides a high level of anonymity for consumers. The role AP certifies re-encrypted data after verifying the validity of the content from consumers, but with no private information of the consumers required. With this method, each consumer can get a required anonymity level, depending on the available time, computation and cost.There are two types of problems that may arise in permission-role assignments. One is related to authorization granting process. Conflicting permissions may be granted to a role, and as a result, users with the role may have or derive a high level of authority. Another is related to authorization revocation. When permission is revoked from a role, the role may still have the permission from other roles. To solve these problems, we first analyze the duty separation constraints of the roles and role hierarchies in the scheme, then discuss granting a permission to a role, weak revocation permissions and strong revocation permissions for the scheme.
|Item Type:||Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)|
|Additional Information:||Published version deposited in accordance with the copyright policy of the publisher. Copyright 2003 Australian Computer Society, Inc. This paper appeared at Twenty-Sixth Australasian Computer Science Conference (ACSC2003), Adelaide, Australia. Conferences in Research and Practice in Information Technology, Vol 16. Michael Oudshoorn, Ed. Reproduction for academic, not-for-profit purposes permitted provided this text is included.|
|Uncontrolled Keywords:||flexible payment scheme; permission-role assignments|
|Fields of Research (FOR2008):||08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security|
|Socio-Economic Objective (SEO2008):||C Society > 93 Education and Training > 9301 Learner and Learning > 930101 Learner and Learning Achievement|
|Deposited On:||05 Aug 2011 16:08|
|Last Modified:||23 Aug 2011 15:43|
Archive Staff Only: edit this record