A Multi-Layer Secure Prevention Scheme for Improving E-commerce Security

被引:0
|
作者
Lai, Sen-Tarng [1 ]
Leu, Fang-Yie [2 ]
Chu, William Cheng-Chung [2 ]
机构
[1] Shih Chien Univ, Dept Informat Technol & Management, Taipei 10462, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
关键词
e-commerce; security requirement; event detection; security event; MLSPS;
D O I
10.1109/IMIS.2014.73
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.
引用
收藏
页码:505 / 510
页数:6
相关论文
共 50 条
  • [41] Security Perceptions of e-Commerce Users
    Schmidt, Mark
    Chen, Jim
    Phan, Dien
    Arnett, Kirk
    [J]. JOURNAL OF INTERNET COMMERCE, 2009, 8 (1-2) : 44 - 57
  • [42] Mobile E-Commerce Security Architecture
    Wang, Zhuo
    Hu, Ran
    Xu, JianFeng
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING ( GRC 2009), 2009, : 576 - 579
  • [43] Piecemeal security threatens e-commerce
    Graham-Rowe, D
    [J]. NEW SCIENTIST, 2000, 165 (2231) : 18 - 18
  • [44] DSP application in E-commerce security
    Hu, JK
    Xi, ZP
    Jennings, A
    Lee, HYJ
    Wahyudi, D
    [J]. 2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING - VOL IV: SIGNAL PROCESSING FOR COMMUNICATIONS; VOL V: SIGNAL PROCESSING EDUCATION SENSOR ARRAY & MULTICHANNEL SIGNAL PROCESSING AUDIO & ELECTROACOUSTICS; VOL VI: SIGNAL PROCESSING THEORY & METHODS STUDENT FORUM, 2001, : 1005 - 1008
  • [45] On the E-Commerce System Security Audit
    He Zhen
    [J]. ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 2, 2010, : 249 - 254
  • [46] A framework for analyzing e-commerce security
    Kesh, Someswar
    Ramanujan, Sam
    Nerur, Sridhar
    [J]. Information Management and Computer Security, 2002, 10 (04): : 149 - 158
  • [47] Security and Disturbances in e-Commerce Systems
    Vymetal, Dominik
    Suchanek, Petr
    [J]. LIBEREC ECONOMIC FORUM 2011, 2011, : 580 - 589
  • [48] Lightweight security primitives for E-commerce
    Matias, Y
    Mayer, A
    Silberschatz, A
    [J]. PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS, 1997, : 95 - 102
  • [49] E-commerce Security: a Technical Survey
    Tian, Zhaofu
    Xu, Ningning
    Peng, Wuliang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 956 - 960
  • [50] E-commerce security - it's not an Oxymoron !!
    Blanchfield, Dez
    [J]. Telecommunication Journal of Australia, 2000, 50 (04)