Secure business application logic for e-commerce systems

被引:5
|
作者
Nabi, F [1 ]
机构
[1] Univ Luton, Appl Res Ctr Applicable Comp, Informat Secur Syst, Luton, Beds, England
关键词
E-commerce; security; privacy; client trust; business application logic; SSL; CGI scripts;
D O I
10.1016/j.cose.2005.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major reason why most people are still sceptical about e-commerce is the perceived security and privacy risks associated with e-transactions, e.g., data, smart cards, credit cards and exchange of business information by means of online transactions. Today, vendors of e-commerce systems have relied solely on secure transaction protocols such as SSL, while ignoring the security of server and client software. This article, Secure Business Application Logic for e-commerce Systems, discusses a key weak link in e-commerce systems: the business application Logic. Although the security issues of the front-end and back-end software systems in e-commerce application warrant equal attention, but this research focuses on the Security of Middle Tier of e-commerce server that implements the business application logic and traditionally, e-commerce sites implemented the middle tier of software on the web server using CGI. We also present strategies for secure business application logic: good design and engineering, secure configuration, defensive programming and secure wrappers for server-side software. (c) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:208 / 217
页数:10
相关论文
共 50 条
  • [1] Composition and Application of Extended Colored Logic Petri Nets to E-Commerce Systems
    Wang, Zhen
    Luan, Wenjing
    Du, Yuyue
    Qi, Liang
    [J]. IEEE ACCESS, 2020, 8 : 36386 - 36397
  • [2] Secure E-Commerce Scheme
    Cebeci, Sena Efsun
    Nari, Kubra
    Ozdemir, Enver
    [J]. IEEE ACCESS, 2022, 10 : 10359 - 10370
  • [3] E-commerce curriculum: is it secure?
    Yee, J
    Maj, SP
    Kohli, G
    [J]. 4TH BALTIC REGION SEMINAR ON ENGINEERING EDUCATION, SEMINAR PROCEEDINGS, 2000, : 58 - 61
  • [4] The debate for secure E-commerce
    Abbott, Shawn
    [J]. Performance Computing/Unix Review, 1999, 17 (2-4): : 37 - 42
  • [5] The Research on Application of Business Intelligence in Mobile E-commerce
    Gan, Lixin
    Tu, Wei
    Wang, An
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL ACADEMIC WORKSHOP ON SOCIAL SCIENCE (IAW-SC 2013), 2013, 50 : 331 - 334
  • [6] WISE: Business to business E-commerce
    Alonso, G
    Fiedler, U
    Hagen, C
    Lazcano, A
    Schuldt, H
    Weller, N
    [J]. RIDE-VE '99 - NINTH INTERNATIONAL WORKSHOP ON RESEARCH ISSUES ON DATA ENGINEERING: INFORMATION TECHNOLOGY FOR VIRTUAL ENTERPRISES, PROCEEDINGS, 1999, : 132 - 139
  • [7] Business-to-business E-commerce
    Senn, JA
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2000, 17 (02) : 23 - 32
  • [8] BUSINESS TO BUSINESS E-COMMERCE ARCHITECTURE
    Hunyadi, Daniel
    Musan, Mircea
    [J]. INDUSTRIAL REVOLUTIONS, FROM THE GLOBALIZATION AND POST-GLOBALIZATION PERSPECTIVE, VOL V: ECONOMIC INFORMATION TECHNOLOGY IN THE AVANT-GARDE OF CHANGE, 2009, : 66 - 75
  • [9] E-business, not e-commerce
    Anderberg, K
    [J]. COMMUNICATIONS NEWS, 2001, 38 (02): : 4 - 4
  • [10] Business models for E-commerce
    Bhayani, PK
    [J]. IETE TECHNICAL REVIEW, 2000, 17 (04): : 177 - 181