We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Kerberos based Electronic Auction System

by Yashwant Singh Patel, Nitish Kumar Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 9
Year of Publication: 2013
Authors: Yashwant Singh Patel, Nitish Kumar Singh
10.5120/13276-0844

Yashwant Singh Patel, Nitish Kumar Singh . Kerberos based Electronic Auction System. International Journal of Computer Applications. 76, 9 ( August 2013), 29-33. DOI=10.5120/13276-0844

@article{ 10.5120/13276-0844,
author = { Yashwant Singh Patel, Nitish Kumar Singh },
title = { Kerberos based Electronic Auction System },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 9 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number9/13276-0844/ },
doi = { 10.5120/13276-0844 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:45:28.313586+05:30
%A Yashwant Singh Patel
%A Nitish Kumar Singh
%T Kerberos based Electronic Auction System
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 9
%P 29-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An electronic auction (e-auction) system is an auction system in which a process of selling, buying and other services are provided with the help of online software, In the modern era e-auction system is increasing rapidly and because of its popularity the need of quality and security are also increasing. In this paper a 'KBEAUCS' model is proposed which provides user an another way of participating in auction irrespective of the geographic locations and without worrying about security threats.

References
  1. P. Hemantha Kumar, Gautam Barua (2001), "Design of a Real-Time Auction System" 4th International Conference on Electronic Commerce Research, Dallas, Texas, USA, November 8-11, 2001.
  2. Miriam R. Albert (2008), "E-buyer beware: Why online auction fraud should be regulated", Article first published online: 28 Jun 2008 , American Business Law Journal, Volume 39,Issue 4, June 2002, pp 575-644.
  3. David Lucking-Reiley (2003) ,"Auctions on the Internet: What's Being Auctioned, and How?",Article first published online: 27 Mar 2003, The Journal of Industrial Economics, Volume 48, Issue 3, September 2000, pp 227-252.
  4. Vakrat, Y. , Seidmann, A. (2000), "Implications of the bidders' arrival process on the design of online auctions", Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,2000.
  5. San Jose Mercury News (2002-06-11) "Stolen-Property Purchases Leave Ebay Buyers Burned" (http://www. highbeam. com/doc/1G1- 120375160. html).
  6. The Sunday Times (2009-04-11) "Ebay: Brisk Bidding in stolen goods".
  7. BBC News (2010-07-05) "Man fined over fake eBay auctions"(http://news. bbc. co. uk/newsbeat/hi/technology/newsid_10500000/newsid_10508900/10508913. stm).
  8. Shashank Pandit, Duen Horng Chau, Samuel Wang, Christos Faloutsos Carnegie Mellon University , (2007), "NetProbe: A Fast and Scalable System for Fraud Detection in Online Auction Networks". In proceedings of the 16th international conference on World wide web, New York, NY, USA, ACM Press.
  9. Subramanian, S. Dept. of Comput. & Inf. Sci. , Ohio State Univ. , Columbus, OH, USA, (Oct 1998) "Design and verification of a secure electronic auction protocol", In proceedings of Seventeenth IEEE Symposium on Reliable Distributed Systems,1998,pp 204-210.
  10. Jannik Dreier, Pascal Lafourcade, and Yassine Lakhnech Universite Grenoble 1, CNRS, Verimag, FRANCE, (2013) "Formal Verification of e-Auction protocols". In proceedings of Second International Conference on Principles of Security and Trust,, Lecture Notes in Computer Science Volume 7796, 2013, pp 247-266.
  11. Qinghua Xiao, Coll. of Comput. Sci. , Zhejiang Univ. , Hangzhou, China, Lingdi Ping, (11/2004) ,"A general secure electronic auction protocol", In proceeding of: Systems, Man and Cybernetics, 2004 IEEE International Conference on, Volume: 1,pp 398-402.
  12. Virendra Kumar Yadav, Saumya Batham, Amit Kumar Mallik,(2012) "Kerberos based Electronic Voting System", ICNICT - Number 2 , IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies, 2012 by IJCA Journal.
  13. Steven M. Bellovin, Michael Merritt – AT&T Bell Laboratories, (1991) ,"Limitations of the Kerberos Authentication System".
  14. Shanthi Potla, "Online Auctioning", A Thesis Presented to the Faculty of San Diego State University in the Summer of 2011.
Index Terms

Computer Science
Information Sciences

Keywords

KBEAUCS Kerberos AS UID Credit Card TGS.