timestamp that was included in the document.
Finally the XAdES signature is validated.
Step5: Storage of Order at Receiver’s XML
Database and Dispatching a Receipt (Actions 26-27
(Figure4))
The Receiver’s Web Service stores the e-Order
and a receipt in the Receiver’s XML Database. From
now on, the e-order is available for parsing and
further processing by the Receiver’s users. Then, the
Receiver’s Web Service dispatches the SOAP
receipt, referencing to the received order, and
containing the status of the whole process. The
SOAP receipt is signed by the receiver’s server in
order to be valid as a receipt.
Step6: Storage of Order at Sender’s XML
Database (Actions 28-29 (Figure 4))
The Sender’s Web Service receives the signed
SOAP receipt and it stores it in its XML database
along with the sent order.
4 CONCLUSIONS AND FURTHER
RESEARCH
In this paper, we presented an architecture for a
secure e-Ordering service. The proposed system is a
secure tool for SMEs which desire to send and
receive electronic orders via the Internet in a trustful
manner. From a technological point of view, the
system is compliant and in accordance with state-of-
the-art standards that constitute an interoperable,
affordable and scalable solution that address the
security requirements, described in Section 2.1. The
architecture is based on XML, XML digital
signatures and encryption, xCBL and Web Services.
Our future research plan is to enhance the
functionality and interoperability features of the
proposed architecture addressing two more
requirements: mobility and privacy. Our interest is
focused on the implementation of the Privacy
requirements as they are specified in the W3C
working draft “Web Service Architecture (WSA)
Requirements” (Austin, 2002) in the current
electronic version of the service and in its future
mobile version.
REFERENCES
Meier., W., 2002. eXist: An Open Source Native XML
Database, In Lecture Notes In Computer Science,
Revised Papers from the NODe 2002 Web and
Database-Related Workshops on Web, Web-Services,
and Database Systems, Springer-Verlag.
Adams, C., Lloyd, S.. 1999. Understanding Public-Key
Infrastructure – Concepts, Standards and Deployment
Considerations, Macmillan Technical Publishing, 1st
Edition.
A. Kaliontzoglou, P. Boutsi, D. Polemi , 2006. “eInvoke:
Secure e-Invoicing based on Web Services”,
Electronic Commerce Research, Kluwer, 2006 (to
appear).
Sklavos et al, 2001. Time stamping in e-commerce, E-
Business E-work EBEW 2001 proceedings, IOS Press.
Austin, D., 2002. Web Services Architecture
Requirements, Internet draft, work in progress.
Microsoft, 2003. eOrder, Business Solutions-Great Plains.
XAdES, 2002. ETSI TS 101 903 V1.1.1 - XML Advanced
Electronic Signatures (XAdES).
Eastlake, D., Reagle, J., 2002. XML Encryption Syntax
and Processing, W3C Recommendation,
www.w3.org/TR/xmlenc-core.
Nadalin, A., 2004. Web Services Security: SOAP Message
Security 1.0 (WS-Security 2004), OASIS Standard,
docs.oasis-open.org/wss/2004/01/oasis-200401-wss-
soap-message-security-1.0.pdf
Hartman, B., 2003. Mastering Web Services Security,
Wiley Publishing.
Message Authentication Codes (MAC), 2002,
Cryptographic Message Syntax (CMS) Algorithms,
IETF RFC 3370.
Secure Sockets Layer (SSL)
http://wp.netscape.com/eng/ssl3/.
xCBL.org, 2003, XML Common Business Library version
4.00 (xCBL v4.00).
www.xcbl.org/xcbl40/xcbl40.html.
European Parliament, 1997. “Privacy Act in the Telecom
Sector, Directive 97/66/EC”
European Parliament, 1995. “Free movement, Directive
95/46/EC”
European Parliament, 1996. “Legal protection of
databases, Directive 96/9/EC”.
Directive 1999/93/EC of the European Parliament on
electronic signatures Official Journal L 013 ,
19/01/2000 p. 0012 – 0020,
http://europa.eu.int/ISPO/ecommerce/legal/digital.htm
l
European Parliament, 2000. “E-commerce, Directive
2000/31/EC”.
http://europa.eu.int/ISPO/ecommerce/legal
European Parliament, 2002. “Protection of Privacy,
Directive 2002/58/EC”.
http://europa.eu.int/ISPO/ecommerce/legal
WEBIST 2006 - INTERNET TECHNOLOGY
62