Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1626195.1626261acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Extended electronic signature policies

Published: 06 October 2009 Publication History

Abstract

A signature policy collects the rules to create and validate electronic signatures under which they become binding in a particular transactional context. These policies have been widely adopted to enforce the binding property of signatures in business scenarios. However, current standards only cover the definition of the requirements to be fulfilled by a single signature. As a consequence, business models where more than one signature is required in order to make the transaction effective cannot adhere to the benefits of signature policies. This paper is the first to propose a solution where the dependences and relationships among the signatures generated in the same transaction can be established. In particular, the ASN.1 definition of an extended signature policy is presented along with the procedures to be followed by the transacting parties. This work will be submitted to the IETF PKIX Work Group to be considered as an Experimental Request For Comments document (RFC).

References

[1]
Electronic Signatures in Global and National Commerce Act, Federal Trade Commission, Department of Commerce, United States of America, 2000.
[2]
European Directive 1999/93/CE of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures.
[3]
UNCITRAL Model Law on Electronic Signatures with Guide to Enactment, United Nations, 2001.
[4]
ISO/IEC 13888-3 Information technology--Security techniques--Non repudiation--Part 3: Mechanisms Using Asymmetric Techniques. International Organization for Standardization, 1997.
[5]
ETSI TR 102 038--TC Security--Electronic Signatures and Infrastructures (ESI). XML format for signature policies v1.1.1. European Telecommunications Standards Institute (ETSI), April 2002.
[6]
ETSI TR 102 041--Signature Policies Report v1.1.1. European Telecommunications Standards Institute (ETSI), February 2002.
[7]
ITU-T Recommendation X.680. Information technology--Abstract Syntax Notation One (ASN.1): Specification of basic notation. ITU-T, 2002.
[8]
ETSI TR 102 045--Electronic Signatures and Infrastructures (ESI); Signature policy for extended business model v1.1.1. European Telecommunications Standards Institute (ETSI), March 2003.
[9]
ETSI TR 102 272--Electronic Signatures and Infrastructures (ESI); ASN.1 format for signature policies v1.1.1. European Telecommunications Standards Institute (ETSI), December 2003.
[10]
ETSI TS 101 903--XML Advanced Electronic Signatures (XAdES) v1.3.2. European Telecommunications Standards Institute (ETSI), March 2006.
[11]
ETSI TS 101 733--Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES) v1.7.4. European Telecommunications Standards Institute (ETSI), July 2008.
[12]
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. RFC 5280--Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Internet Engineering Task Force (IETF), 2008.
[13]
J. C. Cruellas, G. Karlinger, D. Pinkas, and J. Ross. XML Advanced Electronic Signatures (XAdES). World Wide Web Consortium (W3C), 2003.
[14]
J. L. Hernandez-Ardieta, A. I. Gonzalez-Tablas, B. R. Alvarez. An Optimistic Fair Exchange Protocol based on Signature Policies. Computers&Security, 27(7-8):309--322, December 2008.
[15]
S. Kremer, O. Markowitch, and J. Zhou. An intensive survey of fair non-repudiation protocols. Computer Communications, 25:1601--1621, April 2002.
[16]
D. Pinkas, N. Pope, and J. Ross. RFC 5126--CMS Advanced Electronic Signatures (CAdES). Internet Engineering Task Force (IETF), 2008.
[17]
I. Ray and I. Ray. Fair exchange in e-commerce. ACM SIGecom Exchange, 3(2):9--17, May 2002.
[18]
J. Ross, D. Pinkas, and N. Pope. RFC 3125--Electronic Signature Policies. Internet Engineering Task Force (IETF), 2001.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIN '09: Proceedings of the 2nd international conference on Security of information and networks
October 2009
322 pages
ISBN:9781605584126
DOI:10.1145/1626195
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ASN.1
  2. e-commerce
  3. electronic signature
  4. extended business model
  5. public key infrastructure
  6. signature policy

Qualifiers

  • Research-article

Conference

SIN '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 264
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media