On a new approach for e-business security - Network forensics

被引:0
|
作者
Wei, R [1 ]
机构
[1] ZhongNan Univ Ecol & Law, Sch Informat, Wuhan 430064, Peoples R China
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
引用
收藏
页码:516 / 522
页数:7
相关论文
共 50 条
  • [1] On the novel network forensics perspective of enhanced e-business security
    Ren, W
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1355 - 1360
  • [2] The Security, Privacy, and Solutions of E-Business
    Huang, Hao
    Ma, Yuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 441 - 446
  • [3] Relationship of the properties in the e-business security
    Shen Yan-guang
    Si Chun-jing
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING - MANAGEMENT AND ORGANIZATION STUDIES SECTION, 2007, : 1128 - 1131
  • [4] Algorithm aids e-business security
    不详
    IEEE MICRO, 2001, 21 (01) : 7 - 7
  • [5] E-business security: Methodological considerations
    Informatics Research Group, Sheffield Hallam University, Howard Street, S1 1WB, Sheffield, United Kingdom
    World Acad. Sci. Eng. Technol., 2009, (624-631):
  • [6] Security Design for E-Business Applications
    Vasilyevna, Nadejda Belbus
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 248 - 251
  • [7] Security requirements of E-business processes
    Knorr, K
    Röhrig, S
    TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 73 - 86
  • [8] E-business security in international perspective
    Karmakar, NL
    HUMAN PERSPECTIVES IN THE INTERNET SOCIETY: CULTURE, PSYCHOLOGY AND GENDER, 2004, 4 : 523 - 534
  • [9] Authentication and transaction security in E-business
    Mueller, Lorenz
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 175 - 197
  • [10] Modelling e-business security using business processes
    Nachtigal, S.
    Mitchell, C. J.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +