Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

1.60

CiteScore

Chun-Chia Wang This email address is being protected from spambots. You need JavaScript enabled to view it.1, Wen C. Pai1, Lun-Ping Hung1, and Ding-Jung Chiang1

1Department of Information Management Kuang Wu Institute of Technology PeiTou, Taipei, Taiwan 112, R.O.C.


 

Received: January 1, 2000
Accepted: June 1, 2000
Publication Date: June 1, 2000

Download Citation: ||https://doi.org/10.6180/jase.2000.3.2.06  


ABSTRACT


 By secure electronic transaction (SET) protocol, business and customers can construct different electronic commerce models on the Internet. In this paper, we propose a method based on Petri net models and techniques of software engineering to detect unusual electronic commerce transactions. Users can construct all electronic commerce transactions of business and customers by SET. Because of features and functions of SET, users can get security and verification on the network transactions. Using our proposed technique, electronic commerce designers can detect potential security flaws in transaction behavior on the Internet and find any electronic transaction problems that need to solve. 


Keywords: Petri Nets, Reachability Tree, Secure Electronic Transaction (SET)


REFERENCES


  1. [1] Bosik B. and Uyar M. Ú., "Finite State Machine Based Formal Methods in Protocol Conformance Testing: from Theory to Implementation," Computer Networks and ISDN Systems, Vol. 22, pp. 7-33, (1991).
  2. [2] Kalakota R. and Whinston A., Electronic Commerce: A Manager’s Guide, Addison-Wesley (1997).
  3. [3] Landwehr C. E. and Goldschlag D. M., “Security Issues in Networks with Internet Access”, Proceedings of the IEEE, Vol. 85, No. 12, December (1997).
  4. [4] Morgan R. F., “An Internet Marketing Framework for the World Wide Web (WWW)”, Journal of Marketing Management, Vol. 12, pp. 757-775 (1996).
  5. [5] Mougayar W., Opening Digital Markets, McGraw-Hill, (1998).
  6. [6] Peterson J. L., Petri Net Theory and The Modeling of Systems, Prentice-Hall, Englewood Cliffs, NJ, (1981).
  7. [7] Rapps S. and Weyuker E. J., “Selecting Software Test Data Using Data Flow Information," IEEE Trans. on Software Eng., Vol. SE-11, No. 4, pp. 367-375, April (1985).
  8. [8] Schlueter C. and Shaw M. J., “A strategic framework for developing electronic commerce”, IEEE Internet Computing, Nov/Dec, pp. 20-28. (1997).
  9. [9] Tadao Murata, “Petri Nets: Properties, Analysis, and Applications," Proceedings of the IEEE, Vol. 77, No. 4, pp. 541-580, April (1989).
  10. [10] Visa International and MasterCard International, secure electronic transaction (SET) specification, Version 1.0, May (1997).
  11. [11] Watanabe H., Tokuoka H., Wenxin Wu, and Saeki M., "A Technique for Analysing and Testing Object-Oriented Software Using Coloured Petri Nets," IEEE International Conference, pp. 182-190, (1998).