Probe into E-commerce Security Technology

被引:0
|
作者
Ge Qingping [1 ]
Feng Li [1 ]
Yang Li [1 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100048, Peoples R China
关键词
E-commerce security system; encryption techniques; ID authentication; firewall; security protocol;
D O I
10.1109/IFCSTA.2009.226
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Among all the restraints of the development of E-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of E-commerce security technologies have attracted more and more attention and study. In order to find better solutions of E-commerce security problems, such as anti-wiretapping, anti-juggling of the information, transaction denying, and the false order form or contract and so on. According to the ISO Open Systems interconnect seven layer protocol models, the E-commerce security system can be divided into five layers that network service layer, encryption technology layer, secure authentication layer, security protocol layer and application layer. Based on these five layers, make an instruction and analysis of the current technology used most in E-commerce security area, such as Firewall technology, encryption technology, authentication technology as well as security protocol; and then put forward some suggestions.
引用
收藏
页码:425 / 428
页数:4
相关论文
共 50 条
  • [31] An internet security system for E-commerce
    Ng, KT
    Chau, WN
    Siu, YM
    IECON-2002: PROCEEDINGS OF THE 2002 28TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4, 2002, : 2468 - 2472
  • [32] Research on Security Architecture of E-Commerce
    Shen-Zihao
    Wang-Hui
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 185 - 188
  • [33] Piecemeal security threatens e-commerce
    Graham-Rowe, D
    NEW SCIENTIST, 2000, 165 (2231) : 18 - 18
  • [34] E-commerce Security: a Technical Survey
    Tian, Zhaofu
    Xu, Ningning
    Peng, Wuliang
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 956 - 960
  • [35] Security and Disturbances in e-Commerce Systems
    Vymetal, Dominik
    Suchanek, Petr
    LIBEREC ECONOMIC FORUM 2011, 2011, : 580 - 589
  • [36] On the E-Commerce System Security Audit
    He Zhen
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 2, 2010, : 249 - 254
  • [37] Lightweight security primitives for E-commerce
    Matias, Y
    Mayer, A
    Silberschatz, A
    PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS, 1997, : 95 - 102
  • [38] A framework for analyzing e-commerce security
    Kesh, Someswar
    Ramanujan, Sam
    Nerur, Sridhar
    Information Management and Computer Security, 2002, 10 (04): : 149 - 158
  • [39] Study on Security Framework in E-Commerce
    Tao, Lu
    Xue, Lei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3541 - 3544
  • [40] Face recognition for e-commerce security
    Wang, W
    Hui, SC
    Gao, Y
    Leung, MKH
    IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 904 - 907