{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:07Z","timestamp":1754157667760,"version":"3.41.2"},"reference-count":0,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,3,1]]},"abstract":"<jats:p>Discusses the requirements \u2010 both technical and geopolitical \u2010 for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including trusted third party (TTP) and self\u2010signed certification authorities. Depicts the relevant layers of interactions each option entails. Explains the structures of proprietary keying systems and of hierarchical certification authorities. Addresses the geopolitical elements \u2010 especially policy and procedures, and national legal frameworks \u2010 required to effectively implement the trust that secure transactions require.<\/jats:p>","DOI":"10.1108\/09685229810207416","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"21-27","source":"Crossref","is-referenced-by-count":1,"title":["Seamless secured transactions"],"prefix":"10.1108","volume":"6","author":[{"given":"Carrie","family":"Liddy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alice","family":"Sturgeon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685229810207416","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810207416\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685229810207416\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:47Z","timestamp":1753402187000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/6\/1\/21-27\/174316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,3,1]]},"references-count":0,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1998,3,1]]}},"alternative-id":["10.1108\/09685229810207416"],"URL":"https:\/\/doi.org\/10.1108\/09685229810207416","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[1998,3,1]]}}}