ThesaHelp: references a-b
Topic: accounting
Topic: micropayment systems
Topic: encryption
Topic: embedded systems
Topic: security by capabilities
Topic: preventing accidental errors
Topic: unique numeric names as surrogates
Topic: security by secure domains
Topic: key distribution
Topic: limitations of system security
Topic: security leaks and weaknesses
Group: testing
Topic: programming without errors
| |
Reference
Anderson, R.J., Bezuidenhoudt, S.J.,
"On the reliability of electronic payment systems",
IEEE Transactions on software Engineering, 22, 5, May 1996, pp. 294-301.
Google
Quotations
294 ;;Quote: billing systems for utilities can cost 10-30% of revenue; UK parking meters cost 70-80% of revenue
| 294 ;;Quote: cryptographic micropayment system for electricity meters; many users, low overhead, robust
| 297 ;;Quote: used 20-digit cryptographic tokens; provides man-machine interface between customer and electricity meter
| 297 ;;Quote: print 20-digit cryptographic token in two lines of four-digit groups; significantly reduced error rate
| 297 ;;Quote: key management was tricky; used a secure processor in a credit control hierarchy; refilling the processor's credit counter required a higher level transaction
| 299 ;;Quote: no matter what is done, small mistakes with large consequences will still occur; prolonged field testing is necessary for a payment system
| 300 ;;Quote: most frauds were due to loopholes caused by design and management errors; exploited opportunistically by operators and customers; for example, shorting the 11 kV feeder to credit a meter
|
Related Topics
ThesaHelp: references a-b (396 items)
Topic: accounting (10 items)
Topic: micropayment systems (8 items)
Topic: encryption (43 items)
Topic: embedded systems (26 items)
Topic: security by capabilities (65 items)
Topic: preventing accidental errors (36 items)
Topic: unique numeric names as surrogates (67 items)
Topic: security by secure domains (42 items)
Topic: key distribution (33 items)
Topic: limitations of system security (32 items)
Topic: security leaks and weaknesses (56 items)
Group: testing (18 topics, 551 quotes)
Topic: programming without errors (28 items)
|