Research and application of the secure model of e-business information

被引:0
|
作者
Liu, MS [1 ]
Ma, YH [1 ]
Li, WX [1 ]
Wang, SH [1 ]
机构
[1] Shijiazhuang Railway Inst, Sch Informat Engn, Shijiazhuang 050043, Peoples R China
关键词
e-business; information security; information authentication;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information security is one of the key problems arising in the course of the development of the computer network technology and its applications, and is even more critical in e-business systems. How to synthetically utilize information security techniques and how to build a practical e-business information secure model are the problems that the e-business needs to solve urgently. This paper discusses basic security requirements of e-business information and pivotal techniques to satisfy those requirements, and suggests an information secure model applicable to our e-business system development practice.
引用
收藏
页码:205 / 210
页数:6
相关论文
共 50 条
  • [1] The research and application of three-dimensional E-business model
    Qi, Ming
    Wu, Junfeng
    [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 710 - 714
  • [2] Information Mining on the Web; E-business Application
    Taherdoost, Hamed
    Hosseinkhani, Javad
    [J]. 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 500 - 503
  • [3] If e-business is different, then so is research in e-business
    Clarke, R
    [J]. SEEKING SUCCESS IN E-BUSINESS: A MULTIDISCIPLINARY APPROACH, 2003, 123 : 3 - 19
  • [4] Application analysis and research on e-business model of China's tourism
    Zhang, Qinghua
    [J]. 2007 INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1-3, 2007, : 755 - 759
  • [5] Research on Medicine E-business Platform Model
    Zhang Qing-Hua
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3561 - 3564
  • [6] Framework research of building e-business information infrastructure
    Wang, W
    Li, SP
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON E-BUSINESS (ICEB2002), 2002, : 219 - 222
  • [7] The research and realization of information hiding in the E-business environment
    Ge, XH
    Tian, H
    Wang, JZ
    [J]. Fourth Wuhan International Conference on E-Business: The Internet Era & The Global Enterprise, Vols 1 and 2, 2005, : 159 - 161
  • [8] Research on the Application Model of Business Intelligence (BI) in E-Business from the Perspective of Chinese Culture
    Ye Qiongwei
    Li Yaotang
    Nie Qiuyun
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 907 - 911
  • [9] Research of E-business Application based on Data Mining
    Shen Zi-Hao
    Peng Wei-Ping
    [J]. CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 749 - 753
  • [10] Depicting E-business Application Adoption for Small and Medium Enterprises (SMEs): The E-business Triangle Model
    Putra, Panca O. Hadi
    Hasibuan, Zainal A.
    Sunarya, P. O. Abas
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, ENGINEERING, AND DESIGN (ICCED), 2017,