Security Design for E-Business Applications

被引:1
|
作者
Vasilyevna, Nadejda Belbus [1 ]
机构
[1] Tashkent Univ Informat Technol, Tashkent, Uzbekistan
关键词
e-Business; IT Security; Security Control; e-Business Management;
D O I
10.1109/UMC.2008.57
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a security design for an e-business environment with the use of the three-layered e-business architecture. This security design proposes best practices in general. It involves different stages of the management process (planning, deployment, administration, and auditing) and security control by layers - from physical access, to network communication, to operating systems, to applications. Issues such as security management process analysis, control analysis, and cost-benefits analysis are also discussed.
引用
收藏
页码:248 / 251
页数:4
相关论文
共 50 条
  • [31] E-BUSINESS DESIGN A Shift to Adaptability
    Marca, David A.
    WINSYS 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2009, : IS21 - IS29
  • [32] E-BUSINESS DESIGN A Shift to Adaptability
    Marca, David A.
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : IS21 - IS29
  • [33] The Design of the Collaborative E-Business Platform
    Cen Gang
    Ying Weiping
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 188 - +
  • [34] SECURITY IN E-BUSINESS Understanding Customers Perceptions and Concerns
    Alqatawna, Ja'far
    Siddiqi, Jawed
    Btoush, Mohammed Hjouj
    WEBIST 2010: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGY, VOL 2, 2010, : 319 - 324
  • [35] E-business - Security lane added to the information highway
    D'Amico, E
    CHEMICAL WEEK, 2002, 164 (17) : 21 - 23
  • [36] Security and Privacy in IoT based E-Business and Retail
    Kaushik, Keshav
    Dahiya, Susheela
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 78 - 81
  • [37] A security architecture for E-business based on grid technology
    Zhou, Ning
    Zhang, Fangfang
    Yu, Xiaosheng
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1352 - 1356
  • [38] Public Key Infrastructure: managing the e-Business security
    Lai, XJ
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 505 - 505
  • [39] A METHOD TO ENSURE DATA SECURITY IN E-BUSINESS CLOUD
    Gong, Jingyi
    Han, Kaifeng
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 422 - 425
  • [40] If e-business is different, then so is research in e-business
    Clarke, R
    SEEKING SUCCESS IN E-BUSINESS: A MULTIDISCIPLINARY APPROACH, 2003, 123 : 3 - 19