Technology Infrastructure For Electronic Commerce: Olga Gelbart Rosa@seas - Gwu.edu
Technology Infrastructure For Electronic Commerce: Olga Gelbart Rosa@seas - Gwu.edu
Technology Infrastructure For Electronic Commerce: Olga Gelbart Rosa@seas - Gwu.edu
Electronic Commerce
Olga Gelbart
[email protected]
THE GEORGE WASHINGTON UNIVERSITY
based on Prof. Lance Hoffman’s Lecture on Network Infrastructure for Electronic Commerce
Snapshots of the Electronic
Commerce World
Yesterday - EDI
Today - getting our toes wet, what this course is
about
Tomorrow - Metadata, machine understandable
information on the Web.
– Catalog information
– Intellectual property information
– Endorsement Information
– Privacy information
– see www.w3c.org/pics and www.w3c.org/p3p
How Did We Get Here?
Before the Internet
– History of Commerce and Money
– Elements of payment systems
The Start of the Internet
– Predecessor Networks
– Timeline of Significant Events
The Internet Today
– What is the Internet?
– How Does the Internet Work?
– Differences from Original Net
– Differences from Traditional World Out There
The Internet in the Future
What is the Internet?
On October 24, 1995, the FNC unanimously passed a resolution defining
the term Internet. This definition was developed in consultation with
members of the internet and intellectual property rights communities.
RESOLUTION: The Federal Networking Council (FNC) agrees that the
following language reflects our definition of the term "Internet". "Internet"
refers to the global information system that -- (i) is logically linked together
by a globally unique address space based on the Internet Protocol (IP) or
its subsequent extensions/follow-ons; (ii) is able to support
communications using the Transmission Control Protocol/Internet Protocol
(TCP/IP) suite or its subsequent extensions/follow-ons, and/or other IP-
compatible protocols; and (iii) provides, uses or makes accessible, either
publicly or privately, high level services layered on the communications
and related infrastructure described herein.
http://www.fnc.gov/Internet_res.html
The Internet - connections
•Computers in the backbone connected by a (T3)
data connection (45 megabits/second)
•ISP hosts and other powerful computers connect
using (T1,Broadband) lines
•Leased lines (some businesses)
•Modem dial-up connections
•Cable modems
•ADSL - Asymmetric Digital Subscriber Line
Internet features
Originally ARPAnet
– MIT, MITRE, SRI, BBN
– Distributed communications even with many
failure points
– Dissimilar computers exchange info easily
– Route around nonfunctioning parts
– 4 sites: SRI, UCLA, UCSB, Univ of Utah
Hafner and Lyon, Where Wizards Stay Up
Late, Simon & Schuster 1996
Kahn’s Internet Principles
R. Kahn, Communications Principles for Operating Systems. Internal BBN
memorandum, Jan. 1972.
http://info.isoc.org/internet/history/brief.html
Technological Evolution
– Packet Switching
– Scale, Performance, Functionality
Operations and management of a global
and complex infrastructure
Social Aspect - Internauts
Commercialization
Internet Development Timeline
Proving identity
– Passports
– Driver’s licenses
– Credit Cards
– Doctors’ diplomas
Gail Grant
Privacy
Locks
Doors
Perimeter security
Castles
Gail Grant
M
Y
T
H
R
E
A
L
I
T
Y
Message Integrity
Wax seals
Tylenol seals
Custom seals
US Mail
Gail Grant
Non-Repudiation
Handshake
Notary Public
Signatures
Contacts
Gail Grant
Electronic cash policy issues
anonymity
– can lead to “perfect” crime
traceability (accountability)
security (no electronic muggings)
Certification Authority Functions
Accept applications for certificates
Verify the identity of the person or organization
applying for the certificate
Issue certificates
Revoke/Expire certificates
Provide status information about the certificates
that it has issued
But what do the certificates mean?
Gail Grant
Who Sells CA Products
and Services?
Atalla Corporation
BBN Corporation
CertCo
Cylink Corporation
Entrust Technologies Inc.
GTE Corporation
IBM
Netscape Communications
VeriSign
Xcert Software Inc.
July 1997
Legal Issues
Legislation
Responsibilities
Liability
International Usage
Certification Practice Statements
Business Issues for CAs
Business Models
Risks
Costs
In-House vs Out-Sourcing
Operational Considerations
Liability
Some Problems
Untrusted computer systems
Not all persons are trustable
Law not clear
Policy not clear
Sovereignty challenged:
– Cryptography policy
• Anonymity
• Confidentiality
25300
2
Key Escrow Holders
1 Law Enforcement
Agency
Commerce Dept., NIST Court
Treasury Dept., Automated Systems Div
CURRENT ENCRYPTION
LEGISLATION
Highlights: Full Text at
SAFE (HR 695)
http://www.cdt.org/crypto/
Reps. Goodlatte (R-VA), Eshoo (D-CA)
Pro-CODE (S 377)
– Sen. Leahy (D-VT), Burns (R-CO), Wyden (D-OR)
– Audio and photo transcript and lots of information
from 3/19/97 hearing at
www.democracy.net/archive/03191997
Commonalities between SAFE and Pro-CODE
– Prohibit government from imposing mandatory key escrow
– No export license required for public domain or
– generally available encryption software
(Draft Clinton administration legislation [no warrant])
Building a Home Page to Sell
Something
Just Building a Home Page
Now Making It Sell Something
What to Sell?