Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A question of trust

Published: 01 September 2005 Publication History

Abstract

An economic perspective on quality standards in the certification services market.

References

[1]
Aalberts, B. and Van Der Hof, S. Digital signature blindness analysis of legislative approaches to electronic authentication. The EDI Law Review 7, 1 (2000), 1--55.
[2]
Akerlof, G. The market for `lemons': Quality uncertainty and the market mechanism. Quarterly Journal of Economics 89 (1970), 488--500.
[3]
Backhouse, J., Hsu, C., Baptista, J., and Tseng, J. C. The key to trust? Signaling quality in the PKI market. In Proceedings of the 11th European Conference on Information Systems (Naples, Italy, 2003).
[4]
Camp, L.J. and Lewis, S., Eds. Economics of Information Security. Kluwer Academic Publishers, Boston, 2004.
[5]
Clarke, R. Privacy requirements of public key infrastructure. Internet Law Bulletin 3, 1 (2000), 2--6.
[6]
Ellison, C. and Schneier, B. Ten risks of PKI: What you are not being told about public key infrastructure. Computer Security Journal, XVI (2000).
[7]
Ford, W. and Baum, M.S. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice Hall, Upper Saddle River, NJ, 1997.
[8]
Gordon, L., Loeb, M., and Sohail, T. A framework for using insurance for cyber risk management. Commun. ACM 46, 3 (Mar. 2003), 81--85.
[9]
Lloyd, S. et al. CA-CA interoperability. PKI Forum TWG, 2001.
[10]
Shapiro, C. and Varian, H. Information Rules: A Strategic Guide to the Network Economy. Harvard Business School Press, Boston, 2002.
[11]
Spyrelli, C. Electronic signatures: A transatlantic bridge? An EU and U.S. legal approach towards electronic authentication. Journal of Information, Law, and Technology 2 (2002); elj.warwick.ac.uk/jilt/.
[12]
Wilson, S. A comparison of authentication technologies in e-business. The Asia Business Law Review (July 2001).

Cited By

View all
  • (2016)Collaboration and Trust Building Among Public and Private ActorsPoverty, Inequality and Development10.1007/978-3-319-27823-0_3(47-66)Online publication date: 27-Feb-2016
  • (2013)Information strategies to support full information product pricingInformation Polity10.5555/2657006.265701218:1(75-91)Online publication date: 1-Jan-2013
  • (2013)How to Govern the Cloud? Characterizing the Optimal Enforcement Institution that Supports Accountability in Cloud ComputingProceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science - Volume 0210.1109/CloudCom.2013.100(33-38)Online publication date: 2-Dec-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 48, Issue 9
Special issue: RFID
September 2005
109 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1081992
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2005
Published in CACM Volume 48, Issue 9

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)83
  • Downloads (Last 6 weeks)11
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Collaboration and Trust Building Among Public and Private ActorsPoverty, Inequality and Development10.1007/978-3-319-27823-0_3(47-66)Online publication date: 27-Feb-2016
  • (2013)Information strategies to support full information product pricingInformation Polity10.5555/2657006.265701218:1(75-91)Online publication date: 1-Jan-2013
  • (2013)How to Govern the Cloud? Characterizing the Optimal Enforcement Institution that Supports Accountability in Cloud ComputingProceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science - Volume 0210.1109/CloudCom.2013.100(33-38)Online publication date: 2-Dec-2013
  • (2013)Who do you think you are? A review of the complex interplay between information systems, identification and identityEuropean Journal of Information Systems10.1057/ejis.2013.3423:1(17-35)Online publication date: 27-Dec-2013
  • (2012)A Structured Approach to the Design of Viable Security SystemsISSE 2011 Securing Electronic Business Processes10.1007/978-3-8348-8652-1_22(246-255)Online publication date: 2012
  • (2011)The effect of encryption on Internet purchase intent in multiple vendor and product risk settingsElectronic Commerce Research10.1007/s10660-011-9080-611:4(401-419)Online publication date: 1-Nov-2011
  • (2009)Adverse selection in online "trust" certificationsProceedings of the 11th International Conference on Electronic Commerce10.1145/1593254.1593286(205-212)Online publication date: 12-Aug-2009
  • (2009)Efficient Topic-Based File Sharing in Hybrid Wireless NetworksProceedings of the 42nd Hawaii International Conference on System Sciences10.1109/HICSS.2009.180(1-9)Online publication date: 5-Jan-2009
  • (2007)Making Digital Signatures Work across National BordersISSE/SECURE 2007 Securing Electronic Business Processes10.1007/978-3-8348-9418-2_30(287-296)Online publication date: 2007
  • (2006)Use of a validation authority to provide risk management for the PKI relying partyProceedings of the Third European conference on Public Key Infrastructure: theory and Practice10.1007/11774716_1(1-15)Online publication date: 19-Jun-2006
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media