Assinatura Confiável de Documentos Eletrônicos
Abstract
The intensive use of electronic documents are be possible if new systems that can produce trusted digital signatures were developed. Solutions to produce digital signatures in use today depends on untrustworthy operational platforms leading to untrustworthy signatures. Our main contribution is to develop a model to improve the trust in the process of producing digital signatures. It is also proposed the adoption of Document Revocation Lists (DRL) in order to simplify the document revocation process.
References
Austrália, A. M., Caelli, W., and Little, P. (2003). Electronic signatures - understand the past to develop the future. [link].
Balacheff, B., Chen, L., Plaquin, D., and Proudler, G. (2001). A trusted process to digitally sign a document. In Proceedings of the 2001 Workshop on New Security Paradigms, pages 79-86. ACM Press.
Balfanz, D. and Felten, E. W. (1999). Hand-held computers can be better smart cards. pages 15-24.
Berbecaru, D., Lioy, A., Maino, F., Mazzocchi, D., and Ramunno, G. (2000). Towards concrete application of electronic signatures. pages 543-561. AICA 2000 Symposium.
Brasil (2001). Medida provisória 2.200-2. Media Provisória que instituíu a ICP-Brasil.
EUA (2000). Electronic signatures in global and national commerce act. http://www.ftc.gov/os/2001/02/esignworkshopfrn.htm.
Europa, P. E. (1999). European directive on electronic signature. http://europa.eu.int/ISPO/ecommerce/legal/digital.html.
ITU-T (1997). The directory: Authentication framework. Recomendation X.509.
Josang, A., Povey, D., and Ho, A. (2002). What you see is not always what you sign. In Proceedings of the AUUG2002.
Marcacini, A. T. R. (2000). Documento eletrônico como meio de prova. http://augustomarcacini.cjb.net/textos/docelet2.html.
Marcacini, A. T. R. and da Costa, M. (2001). Criptografia assimétrica, assinaturas digitais e a falácia da "neutralidade tecnológica". http://augustomarcacini.cjb.net/textos/neutec.html.
Menezes, P. V. O. S. V. A. (1997). HandBook of Applied Criptography. CRC Press, Boca Raton, FL - USA, 1 edition.
Microsoft (2003). Microsoft next-generation secure computing base - technical FAQ. Relatório T'ecnico sobre NGSCB.
Pasqual, E. S. (2002). Idde - uma infra-estrutura para a datação de documentos eletrônicos. Master's thesis, Curso de Pós-Graduação em Ciência da Computação da Universidade Federal de Santa Catarina.
Rezende, P. (2002). Sapos piramidais nas guerras virtuais. http://www.observatoriodaimprensa.com.br/artigos/eno201120024.htm.
Rezende, P. A. D. d. (2001). Palavras mágicas sobre entidades certificadoras, assinaturas eletrônicas e projetos de lei. http://www.cbeji.com.br.
Safford, D. (2002). The need for TCPA. Technical report, IBM.
Scheibelhofer, K. (2001). Signing XML documents and the concept of "what you see is what you sign". Master's thesis, Graz University of Technology.
Stallings, W. (1998). Cryptography and Network Security. Prentice Hall, 2 edition.
Stinson, D. R. (2002). Cryptography - Theory and Practice. Chapnan & Hall, 2 edition.
Uncitral, M. d. L. (1999). Uncitral model law on electronic commerce with guide to enactment. http://www.un.or.at/uncitral/texts/electcom/ml-ec.html.
