Prodanović et al., 2019 - Google Patents
Classification as an approach to public key infrastructure requirements analysisProdanović et al., 2019
View PDF- Document ID
- 12361575537957672315
- Author
- Prodanović R
- Vulić I
- Publication year
- Publication venue
- IET Software
External Links
Snippet
Classification schemes and taxonomy of request have focused only on business or software requirements defined by general non‐functional requests. Public key infrastructure (PKI), as a complex system, requires special attention in the process of identification and definition of …
- 238000004458 analytical method 0 title description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Use of an alias or a single-use code
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rios et al. | Service level agreement‐based GDPR compliance and security assurance in (multi) Cloud‐based systems | |
Lin et al. | Privacy, security and resilience in mobile healthcare applications | |
Mori et al. | Systems‐of‐systems modeling using a comprehensive viewpoint‐based SysML profile | |
Al-Aswad et al. | BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation | |
US20220027803A1 (en) | Sustainable tokens for supply chain with privacy preserving protocol | |
US11178022B2 (en) | Evidence mining for compliance management | |
EP4158564B1 (en) | Electronically verifying a process flow | |
CN115943606B (en) | Editable blockchain | |
Yan | Trust Management in Mobile Environments: Autonomic and Usable Models: Autonomic and Usable Models | |
Rupa et al. | Knowledge engineering–based DApp using blockchain technology for protract medical certificates privacy | |
Hu et al. | Semantic modelling and automated reasoning of non‐functional requirement conflicts in the context of softgoal interdependencies | |
US20210104326A1 (en) | Detecting prescription drug abuse using a distributed ledger and machine learning | |
Sule et al. | Fuzzy logic approach to modelling trust in cloud computing<? show [AQ ID= Q1]?> | |
Kabashkin | Risk modelling of blockchain ecosystem | |
Viganò | Formal Methods for Socio-technical Security: (Formal and Automated Analysis of Security Ceremonies) | |
Khan et al. | A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing | |
Viriyasitavat et al. | User-oriented selections of validators for trust of Internet-of-Thing services | |
Prodanović et al. | Classification as an approach to public key infrastructure requirements analysis | |
Johnson et al. | Quantitative information security risk estimation using probabilistic attack graphs | |
US11838427B2 (en) | Usage restrictions for digital certificates | |
Yan | Trust management for mobile computing platforms | |
Said et al. | Smart E-Business Model based on Block Chain (BC) and Internet of Things (IoT) Technologies | |
Laracy et al. | Systems Theory and Information Security: Foundations for a New Educational Approach | |
US20240303147A1 (en) | Method to Estimate Time to Failure From Sectional Survival Probabilities | |
Mirzaei et al. | Simorgh, a fully decentralized blockchain-based secure communication system |