Business Information Exchange System with Security, Privacy, and Anonymity

Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

[1]  Bart De Decker,et al.  User-Centric Identity Management Using Trusted Modules , 2010, EuroPKI.

[2]  David Chaum,et al.  Blind Signature System , 1983, CRYPTO.

[3]  Mark Ryan,et al.  Balancing Societal Security and Individual Privacy: Accountable Escrow System , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.

[4]  Dorothy E. Denning Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.

[5]  A. Acquisti The Economics of Personal Data and the Economics of Privacy , 2010 .

[6]  Jian Wu,et al.  Proxy-Based Web Service Security , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[7]  Sead Muftic,et al.  Secure and privacy-enhanced e-mail system based on the concept of proxies , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[8]  Ulf T. Mattsson A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[9]  Jan Camenisch,et al.  Electronic Identities Need Private Credentials , 2012, IEEE Security & Privacy.

[10]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[11]  Pedro Franco,et al.  Understanding Bitcoin: Cryptography, Engineering and Economics , 2014 .

[12]  Jonathan Zittrain Saving the internet. , 2007, Harvard business review.

[13]  John Bair,et al.  The Tor Browser , 2016 .

[14]  Jeremy Clark,et al.  CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper) , 2012, Financial Cryptography.

[15]  Phil Hunt,et al.  System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements , 2015, RFC.

[16]  Nai Fovino Igor,et al.  Electronic Soft-Identities (E-Ids) State-of-the-art and Multi-Morphed E-Ids, an Explorative Study , 2014 .

[17]  Russ Housley,et al.  An Internet Attribute Certificate Profile for Authorization , 2002, RFC.

[18]  John G. Keating,et al.  A proxy-based security architecture for Internet applications in an extranet environment , 2001, J. Syst. Softw..

[19]  Dorothy E. Denning,et al.  Field Encryption and Authentication , 1983, CRYPTO.

[20]  Yun Ling,et al.  Identity-Based Conditional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).

[21]  Sead Muftic,et al.  Strong Authentication Protocol based on Java Crypto Chip as a Secure Element , 2016 .

[22]  Audun Jøsang,et al.  Usability and Privacy in Identity Management Architectures , 2007, ACSW.

[23]  Nalini Venkatasubramanian,et al.  Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[24]  Sead Muftic BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger , 2016, Ledger.

[25]  Dwen-Ren Tsai,et al.  A proxy-based real-time protection mechanism for social networking sites , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.