共 50 条
- [31] Public Key Infrastructure: managing the e-Business security INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 505 - 505
- [32] A METHOD TO ENSURE DATA SECURITY IN E-BUSINESS CLOUD 2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 422 - 425
- [33] If e-business is different, then so is research in e-business SEEKING SUCCESS IN E-BUSINESS: A MULTIDISCIPLINARY APPROACH, 2003, 123 : 3 - 19
- [34] E-business security design using process security requirements septet SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 408 - 413
- [36] E-business Workflow Security Architecture based on UCON 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 338 - 340
- [37] Research on the Security Model for E-business Process Management 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 369 - +
- [38] Trust, privacy and security in e-business: Requirements and solutions ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 548 - 558
- [39] Smart cards and digital signatures for e-business security 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 124 - 129
- [40] Preserving Consistency and Security of Data in E-business Applications RECENT ADVANCES IN MATHEMATICS AND COMPUTERS IN BUSINESS, ECONOMICS, BIOLOGY & CHEMISTRY, 2010, : 211 - +