Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Analysis for Electronic Payment Systems

Dr.K. Ravikumar, A. Udhayakumar, A. Anitha


In this paper, thus the research analysis, design and implementation phase has been described for our research. It is proposed framework architecture for the Secure Multiparty Electronic Payments in mobile computing in order to support self-protection in AmI scenarios. The architecture of our framework is device-and platform independent and focuses on the use of auctions protocols for electronic payments policies. The top priority was the security of the auctions. All secret information that is exchanged between the auctions host and the peers is encrypted and protected against illegitimate modifications. it will extend the modularity of the proposed framework in order to allow individual utility functions and a replaceable module for determining the winning policy. Further, the integration of our framework into the refinement process of semantic high-level policies is in progress.


Multi-party Security, Mobile Computing, Cryptography, Negotiation

Full Text:



G. Anthes, “mechanism design meets computer Science,” communications of the ACM, vol. 53.11-13,aug.2010.

V .conitzer, “making decisions based on the preferences of multiple agents,” communication the ACM, vol. 53, pp. 84-94, mar. 2010.

“OSGi”serviceplatform-core ecification,” September. 2009. Release 4.2.

P.fishpern, the theory of social choice. Princeton, NJ, USA,: Princeton univ. prees,1973.

“web service policy 1.5 – framework.” W3C recommendation, September, 2007.

K.lawerence et al., “ws-sequrity policy 1.2.”OASIS, July 2007.

A.samir“ how to share a secret,” communication of the ACM, vol. 22, no 11, pp.612-613, 1979.

S. russel and p.norvig, artificial intelligence: a modern approach . Upper saddle river, NJ, USA:prenticehall,2009.

A.mases-colell, m.winston, and j. green, microeconomics theory. Oxford University pressnew York, 1955.

K. Drexler and m. miller,“incentive engineeringfor computational resource managemet,” theecology ofComputation, pp. 231-266, mars. 1988.

W.Zhang,J.Schutte,M.Ingstrup,andAgenetic algorithm-based approach for optimized self-protecdtion in A pervasive servicemiddleware,”in e, pp.404-419, 2009.

V.Gurov et al.,”Unimod:Method and tool for development of reactive object-orientedstates emphasis,”inProceedings of St.Petersburg IEEE Chapters.Year 2005.International Conference 110 Aniversary of Radio Invention,pp.106-110,2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.