Probe into E-commerce Security Technology

被引:0
|
作者
Ge Qingping [1 ]
Feng Li [1 ]
Yang Li [1 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100048, Peoples R China
关键词
E-commerce security system; encryption techniques; ID authentication; firewall; security protocol;
D O I
10.1109/IFCSTA.2009.226
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Among all the restraints of the development of E-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of E-commerce security technologies have attracted more and more attention and study. In order to find better solutions of E-commerce security problems, such as anti-wiretapping, anti-juggling of the information, transaction denying, and the false order form or contract and so on. According to the ISO Open Systems interconnect seven layer protocol models, the E-commerce security system can be divided into five layers that network service layer, encryption technology layer, secure authentication layer, security protocol layer and application layer. Based on these five layers, make an instruction and analysis of the current technology used most in E-commerce security area, such as Firewall technology, encryption technology, authentication technology as well as security protocol; and then put forward some suggestions.
引用
收藏
页码:425 / 428
页数:4
相关论文
共 50 条
  • [1] Research of E-Commerce Security Technology
    Hong, Xie
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3548 - 3552
  • [2] E-commerce security
    Gollmann, D
    [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (03): : 115 - 118
  • [3] Security in e-commerce
    Müller, G
    [J]. LECTURES IN E-COMMERCE, 2001, : 149 - 162
  • [4] E-commerce security
    Gollmann, Dieter
    [J]. Elektron, 2001, 18 (03): : 44 - 47
  • [5] On the Security of e-commerce
    Razvan, Raducanu
    Eduard, Omusoru
    [J]. RECENT ADVANCES IN MATHEMATICS AND COMPUTERS IN BUSINESS, ECONOMICS, BIOLOGY & CHEMISTRY, 2010, : 171 - 174
  • [6] E-Commerce security
    Al-Slamy, Nada M. A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (05): : 340 - 344
  • [7] Study on the Database Security Technology in E-commerce Environment
    Yang, Li
    [J]. PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 248 - 251
  • [8] The Application of XML Security Technology in E-commerce System
    Song, Yang
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 422 - 425
  • [9] E-COMMERCE SECURITY ISSUES
    Ladan, Mohamad Ibrahim
    [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 197 - 201
  • [10] Rethinking E-commerce security
    Oreku, George S.
    Li, Jianzhong
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR MODELLING, CONTROL & AUTOMATION JOINTLY WITH INTERNATIONAL CONFERENCE ON INTELLIGENT AGENTS, WEB TECHNOLOGIES & INTERNET COMMERCE, VOL 1, PROCEEDINGS, 2006, : 223 - +