[go: up one dir, main page]

Prodanović et al., 2019 - Google Patents

Classification as an approach to public key infrastructure requirements analysis

Prodanović et al., 2019

View PDF @Full View
Document ID
12361575537957672315
Author
Prodanović R
Vulić I
Publication year
Publication venue
IET Software

External Links

Snippet

Classification schemes and taxonomy of request have focused only on business or software requirements defined by general non‐functional requests. Public key infrastructure (PKI), as a complex system, requires special attention in the process of identification and definition of …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Use of an alias or a single-use code

Similar Documents

Publication Publication Date Title
Rios et al. Service level agreement‐based GDPR compliance and security assurance in (multi) Cloud‐based systems
Lin et al. Privacy, security and resilience in mobile healthcare applications
Mori et al. Systems‐of‐systems modeling using a comprehensive viewpoint‐based SysML profile
Al-Aswad et al. BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation
US20220027803A1 (en) Sustainable tokens for supply chain with privacy preserving protocol
US11178022B2 (en) Evidence mining for compliance management
EP4158564B1 (en) Electronically verifying a process flow
CN115943606B (en) Editable blockchain
Yan Trust Management in Mobile Environments: Autonomic and Usable Models: Autonomic and Usable Models
Rupa et al. Knowledge engineering–based DApp using blockchain technology for protract medical certificates privacy
Hu et al. Semantic modelling and automated reasoning of non‐functional requirement conflicts in the context of softgoal interdependencies
US20210104326A1 (en) Detecting prescription drug abuse using a distributed ledger and machine learning
Sule et al. Fuzzy logic approach to modelling trust in cloud computing<? show [AQ ID= Q1]?>
Kabashkin Risk modelling of blockchain ecosystem
Viganò Formal Methods for Socio-technical Security: (Formal and Automated Analysis of Security Ceremonies)
Khan et al. A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing
Viriyasitavat et al. User-oriented selections of validators for trust of Internet-of-Thing services
Prodanović et al. Classification as an approach to public key infrastructure requirements analysis
Johnson et al. Quantitative information security risk estimation using probabilistic attack graphs
US11838427B2 (en) Usage restrictions for digital certificates
Yan Trust management for mobile computing platforms
Said et al. Smart E-Business Model based on Block Chain (BC) and Internet of Things (IoT) Technologies
Laracy et al. Systems Theory and Information Security: Foundations for a New Educational Approach
US20240303147A1 (en) Method to Estimate Time to Failure From Sectional Survival Probabilities
Mirzaei et al. Simorgh, a fully decentralized blockchain-based secure communication system