Part 8: Intelligent Distributed SystemsInternational audienceThe paper presents the role of documents in the implementation of various types of transactions. The main features of the document determining its usefulness in the effective exchange of legal information, ensuring the authenticity, integrity and non-repudiation of origin are presented. Considering the general background of the document, the concept of an electronic document having significant (in terms of legal effectiveness) features of traditional document as well as those features that allow its operation and processing in the virtual space has been presented. An example of the use of an electronic document in the implementation of typical transactions, which are reflecting traditional electronic transaction will be discussed as well
Supporting the execution of transactions through the use of electronic documents requires security. The scope of this security primarily involves ensuring the integrity, authenticity and non-repudiation of the origin of information. The signed XML document is a powerful tool that ensures the above features and the ease of processing and integration with various systems. An XML document may have many signatures, and each of them may sign different parts of the document. This feature is highly attractive, but in order to use it, the signature and structure of the document must be carefully designed. This article presents the existing risks associated with the use of XML signatures, focusing on XML signature wrapping vulnerability. This vulnerability is a consequence of the relationship between the XML signature and the signed document. The authors suggest that without neglecting the need for protection against the possibility of moving and replacing a fragment of the document, the use of secure XML signature references should also be considered and applied. The article proposes the use of secure signature templates as a countermeasure against the threat of an improper indication of the signed content defined in the signature reference. This threat is serious in automatic signature processing, where it is important to correctly indicate the signed content.
Part 7: Various Aspects of Computer SecurityInternational audienceThe article presents the implementation of an electronic document in the form of electronic forms that can be used in legally binding way in transactions execution regardless of the field of application, the type of entity involved in the transaction or their local information systems. Paper also presents the concept of the form in which the data layer, the presentation and the logic is encapsulated in a one single XML file, whose syntax is described using XML schema (XSD). Presentation of the document is done on the background of the discussion about the general concept of the document and the transaction. Authors present also the ways of implementation a few basic types of transactions, from which more complex solutions can be composed. The vision of the further research and development of the electronic document towards the use of crypto - currency, smart contracts, block chains and distributed autonomous organization is outlined in this paper
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.