Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Performance Analysis for Electronic Payment Systems


Affiliations
1 Tamil University, Thanjavur, India
2 Karpagam University, Coimbatore, India
3 AM Jain College, Chennai, India
     

   Subscribe/Renew Journal


In this paper, thus the research analysis, design and implementation phase has been described for our research. It is proposed framework architecture for the Secure Multiparty Electronic Payments in mobile computing in order to support self-protection in AmI scenarios. The architecture of our framework is device-and platform independent and focuses on the use of auctions protocols for electronic payments policies. The top priority was the security of the auctions. All secret information that is exchanged between the auctions host and the peers is encrypted and protected against illegitimate modifications. it will extend the modularity of the proposed framework in order to allow individual utility functions and a replaceable module for determining the winning policy. Further, the integration of our framework into the refinement process of semantic high-level policies is in progress.

Keywords

Multi-party Security, Mobile Computing, Cryptography, Negotiation.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 147

PDF Views: 4




  • Performance Analysis for Electronic Payment Systems

Abstract Views: 147  |  PDF Views: 4

Authors

K. Ravikumar
Tamil University, Thanjavur, India
A. Udhayakumar
Karpagam University, Coimbatore, India
A. Anitha
AM Jain College, Chennai, India

Abstract


In this paper, thus the research analysis, design and implementation phase has been described for our research. It is proposed framework architecture for the Secure Multiparty Electronic Payments in mobile computing in order to support self-protection in AmI scenarios. The architecture of our framework is device-and platform independent and focuses on the use of auctions protocols for electronic payments policies. The top priority was the security of the auctions. All secret information that is exchanged between the auctions host and the peers is encrypted and protected against illegitimate modifications. it will extend the modularity of the proposed framework in order to allow individual utility functions and a replaceable module for determining the winning policy. Further, the integration of our framework into the refinement process of semantic high-level policies is in progress.

Keywords


Multi-party Security, Mobile Computing, Cryptography, Negotiation.