I am pleased to introduce this publication based on one of the deliverables of the NO PROBLEMS project. This is one of the projects co-financed by the European Commission in the framework of the TEN-Telecom programme. Electronic commerce is high up on the agenda of the European Commission and is one of the priorities of the TEN-Telecom programme. Electronic commerce requires a reliable and secure communications environment. But in order to attract the large number of Europe's SMEs and the European citizens, electronic commerce support services must be widely accessible at low cost. The NO…mehr
I am pleased to introduce this publication based on one of the deliverables of the NO PROBLEMS project. This is one of the projects co-financed by the European Commission in the framework of the TEN-Telecom programme. Electronic commerce is high up on the agenda of the European Commission and is one of the priorities of the TEN-Telecom programme. Electronic commerce requires a reliable and secure communications environment. But in order to attract the large number of Europe's SMEs and the European citizens, electronic commerce support services must be widely accessible at low cost. The NO PROBLEMS project has addressed these challenging requirements by combining two complementary technologies: X.400 messaging for the reliability and the security framework, Internet for the low cost accessibility. NO PROBLEMS is in many regards illustrative of the TEN-Telecom objectives: it combines available technology to provide innovative services to Europe's SMEs. This publication provides an in-depth insight into some of the key technologies expected to playa major role in the support of electronic commerce. Robert Verrue Director General DG XIII European Commission This publication is based on documents of the NO PROBLEMS project, which has been founded by the European Commission DG XIII. The project partners have been INFONOVA GmbH and DATAKOM Austria from Austria as well as ITK Telekommunikation from Germany and ATLANTIDE from France.
1 Introduction.- 2 The X.400 Series of Recommendations.- 2.1 The X.400 Standard 1984.- 2.2 The X.400 Standard 1988.- 2.3 The X.400 Standard 1992.- 2.4 The X.400 Standard 1996.- 2.5 Proposed Additions to the X.400 Functionality for Multimedia Messaging.- 2.6 Physical Access to the X.400 Service.- 3 Internet Mail.- 3.1 RFC 822: Standard for the Format of ARPA Internet Text Messages.- 3.2 RFC 821 Simple Mail Transfer Protocol.- 3.3 SMTP Service Extensions.- 3.4 Delivery Status Notifications (DSN).- 3.5 Multipurpose Internet Mail Extensions (MIME).- 3.6 Post Office Protocol Version 3 (POP3).- 4 X.400-internet Mail Gateways.- 4.1 Introduction.- 4.2 MIME Internet X.400 Enhanced Relay (MIXER).- 5 Directory Services.- 5.1 The X.500 Series of Recommendations.- 5.2 Lightweight Directory Access Protocol (LDAP).- 6 Electronic Commerce and Electronic Data Interchange.- 6.1 The History of Electronic Commerce.- 6.2 Electronic Commerce Today.- 6.3 Electronic Data Interchange-An Introduction.- 7 Standards for EDI Documents.- 7.1 United Nations Electronic Data Interchange for Administration, Commerce and Trade (UN/EDIFACT).- 7.2 Differences and Mutualities Amongst the Different EDI Standards.- 8 Transportation of EDI Messages.- 8.1 EDI Message Transfer via Store-and-Forward Mechanisms.- 8.2 EDI Message Transfer via X.400.- 9 Vulnerabilities and Security Requirements of EDI Messaging Environments.- 9.1 Vulnerabilities.- 9.2 Masquerade.- 9.3 Message Sequencing.- 9.4 Message Loss.- 9.5 Modification of Information.- 9.6 Repudiation.- 9.7 Leakage of Information.- 9.8 Manipulation of Information by EDIMG User.- 9.9 Security Requirements.- 10 Cryptography and Key Management.- 10.1 Cryptography.- 10.2 Key Management.- 11 Security Mechanisms for EDI over X.400.- 11.1 Masquerade.- 11.2 MessageSequencing.- 11.3 Message Loss.- 11.4 Modification of Information.- 11.5 Repudiation.- 11.6 Leakage of Information.- 11.7 Manipulation of Information by EDIMG User.- 11.8 Additional Pervasive Mechanisms.- 12 Security Mechanisms for EDI over the Internet.- 12.1 E-Mail Encryption Protocols.- 13 EDI Naming, Addressing, and Use of a Directory.- 13.1 Introduction.- 13.2 EDI Naming.- 13.3 Suggested DIT Structure for EDI.- 13.4 Name Resolution.- 13.5 Authentication.- 13.6 Capabilities Assessment.
1 Introduction.- 2 The X.400 Series of Recommendations.- 2.1 The X.400 Standard 1984.- 2.2 The X.400 Standard 1988.- 2.3 The X.400 Standard 1992.- 2.4 The X.400 Standard 1996.- 2.5 Proposed Additions to the X.400 Functionality for Multimedia Messaging.- 2.6 Physical Access to the X.400 Service.- 3 Internet Mail.- 3.1 RFC 822: Standard for the Format of ARPA Internet Text Messages.- 3.2 RFC 821 Simple Mail Transfer Protocol.- 3.3 SMTP Service Extensions.- 3.4 Delivery Status Notifications (DSN).- 3.5 Multipurpose Internet Mail Extensions (MIME).- 3.6 Post Office Protocol Version 3 (POP3).- 4 X.400-internet Mail Gateways.- 4.1 Introduction.- 4.2 MIME Internet X.400 Enhanced Relay (MIXER).- 5 Directory Services.- 5.1 The X.500 Series of Recommendations.- 5.2 Lightweight Directory Access Protocol (LDAP).- 6 Electronic Commerce and Electronic Data Interchange.- 6.1 The History of Electronic Commerce.- 6.2 Electronic Commerce Today.- 6.3 Electronic Data Interchange-An Introduction.- 7 Standards for EDI Documents.- 7.1 United Nations Electronic Data Interchange for Administration, Commerce and Trade (UN/EDIFACT).- 7.2 Differences and Mutualities Amongst the Different EDI Standards.- 8 Transportation of EDI Messages.- 8.1 EDI Message Transfer via Store-and-Forward Mechanisms.- 8.2 EDI Message Transfer via X.400.- 9 Vulnerabilities and Security Requirements of EDI Messaging Environments.- 9.1 Vulnerabilities.- 9.2 Masquerade.- 9.3 Message Sequencing.- 9.4 Message Loss.- 9.5 Modification of Information.- 9.6 Repudiation.- 9.7 Leakage of Information.- 9.8 Manipulation of Information by EDIMG User.- 9.9 Security Requirements.- 10 Cryptography and Key Management.- 10.1 Cryptography.- 10.2 Key Management.- 11 Security Mechanisms for EDI over X.400.- 11.1 Masquerade.- 11.2 MessageSequencing.- 11.3 Message Loss.- 11.4 Modification of Information.- 11.5 Repudiation.- 11.6 Leakage of Information.- 11.7 Manipulation of Information by EDIMG User.- 11.8 Additional Pervasive Mechanisms.- 12 Security Mechanisms for EDI over the Internet.- 12.1 E-Mail Encryption Protocols.- 13 EDI Naming, Addressing, and Use of a Directory.- 13.1 Introduction.- 13.2 EDI Naming.- 13.3 Suggested DIT Structure for EDI.- 13.4 Name Resolution.- 13.5 Authentication.- 13.6 Capabilities Assessment.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826