Technology Infrastructure for Electronic Commerce. Olga Gelbart [email protected] THE GEORGE WASHINGTON UNIVERSITY based on Prof. Lance Hoffman’s Lecture on Network Infrastructure for Electronic Commerce. Snapshots of the Electronic Commerce World. Yesterday - EDI
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
1962 Licklider, J.C.R., Galactic Network memos
Licklider - MIT to ARPA
ARPANET and successors: open architecture networking
1970s: universities and other DoD contractors connect
packets rather than circuits (note many of the names in
the articles were graduate students then)
1975: 100 sites and e-mail is changing how people collaborate
Late 1970s: New Packet Switching Protocol:
Transfer Control Protocol/Internet Protocol (TCP/IP)
1980: MILNET takes over military traffic
1980s: NSFNet links together NSF researcgers,
Internet protocols incorporated into (BSD) Unix, a widespread operating system
Late 1980s: NSFNet absorbs original ARPANET (for a US university to get NSF
funding for an Internet connection, that connection had to be made available to
all qualified users on campus, regardless of discipline
1995: Commercial backbones replace NSFNet backbone
Commercial Networks: AOL, Compuserve, etc.
From “A Brief History of the Internet” by B. Leiner, et al.,
From Hobbes’ Internet Timeline at http://info.isoc.org. ...
Adapted from Gail Grant
Adapted from Gail Grant
SATAN) also used by the enemy
Government stalling, an impediment to
progress, or cautious reasoning to avoid chaos?
When should government have right tomonitor telecommunications?
What safeguards prevent abuse ofinformation obtained with taps?
Can a free society toleratehidden data with no accountability?
(adapted from White House briefing)
* provides successor for DES* provides law enforcement solution
Key Escrow Holders
Law Enforcement Agency
Commerce Dept., NISTTreasury Dept., Automated Systems Div
APPLICATION OF BLIND SIGNATURE TO A REAL CRIMEB. von Solms and D. Naccache, Computers and Security 11, 6 (1992)reprinted in Hoffman, L. (Ed.), Building in Big Brother,
Commercial use: Should promote widespreadcommercial use of technologies that canprevent unauthorized access to electronic info
Exportation: Should allow export of DES toprovide an acceptable level of security
Escrow: Premature (Key recovery = current proposal)
Classified material: The debate on cryptopolicy should be open and does not requireknowledge of classified material
Total preliminary report at http://www.nap.edu/nap/online/titleindex.html#c
Cryptography's Role in Securing the Information Society, 1996,National Academy Press, 2101 Constitution Ave. NW, Box 285, Washington DC 20055, (800) 624-6242
Reps. Goodlatte (R-VA), Eshoo (D-CA)
from 3/19/97 hearing at