Security Design for E-Business Applications

被引:1
|
作者
Vasilyevna, Nadejda Belbus [1 ]
机构
[1] Tashkent Univ Informat Technol, Tashkent, Uzbekistan
关键词
e-Business; IT Security; Security Control; e-Business Management;
D O I
10.1109/UMC.2008.57
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a security design for an e-business environment with the use of the three-layered e-business architecture. This security design proposes best practices in general. It involves different stages of the management process (planning, deployment, administration, and auditing) and security control by layers - from physical access, to network communication, to operating systems, to applications. Issues such as security management process analysis, control analysis, and cost-benefits analysis are also discussed.
引用
收藏
页码:248 / 251
页数:4
相关论文
共 50 条
  • [41] Accountancy for E-Business Enterprises Based on Cyber Security
    Yang, Yu
    Yin, Zecheng
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (06)
  • [42] E-business Workflow Security Architecture based on UCON
    Wen, Haoyu
    Ji, Dongxing
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 338 - 340
  • [43] Research on the Security Model for E-business Process Management
    Yu Xin
    Xia MingPing
    Yu, Bai
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 369 - +
  • [44] Trust, privacy and security in e-business: Requirements and solutions
    Katsikas, SK
    Lopez, J
    Pernul, G
    ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 548 - 558
  • [45] Smart cards and digital signatures for e-business security
    Patriciu, VV
    Podaru, V
    Bica, I
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 124 - 129
  • [46] On a new approach for e-business security - Network forensics
    Wei, R
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 516 - 522
  • [47] Research of E-Business Security Based on SOAP Protocol
    Wang, Yiran
    MANUFACTURING PROCESS TECHNOLOGY, PTS 1-5, 2011, 189-193 : 4304 - 4307
  • [48] An active functionality service for E-business applications
    Cilia, M
    Buchmann, AP
    SIGMOD RECORD, 2002, 31 (01) : 24 - 30
  • [49] Architecture environments for E-business agent based on security
    Shin, HJ
    Lee, SG
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 625 - 634
  • [50] Simulation e-business applications using PNML
    Brosso, Ines
    Bressan, Graça
    Ruggiero, Wilson Vicente
    Advances in Communications and Software Technologies, 2002, : 178 - 183