Probe into E-commerce Security Technology

被引:0
|
作者
Ge Qingping [1 ]
Feng Li [1 ]
Yang Li [1 ]
机构
[1] Capital Normal Univ, Informat Engn Coll, Beijing 100048, Peoples R China
关键词
E-commerce security system; encryption techniques; ID authentication; firewall; security protocol;
D O I
10.1109/IFCSTA.2009.226
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Among all the restraints of the development of E-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of E-commerce security technologies have attracted more and more attention and study. In order to find better solutions of E-commerce security problems, such as anti-wiretapping, anti-juggling of the information, transaction denying, and the false order form or contract and so on. According to the ISO Open Systems interconnect seven layer protocol models, the E-commerce security system can be divided into five layers that network service layer, encryption technology layer, secure authentication layer, security protocol layer and application layer. Based on these five layers, make an instruction and analysis of the current technology used most in E-commerce security area, such as Firewall technology, encryption technology, authentication technology as well as security protocol; and then put forward some suggestions.
引用
下载
收藏
页码:425 / 428
页数:4
相关论文
共 50 条
  • [41] Security issues in e-commerce: An overview
    Ahmadi-Brooghani, Zhara
    International Review on Computers and Software, 2010, 5 (05) : 575 - 580
  • [42] E-commerce Security: Classifications and Arts
    Raheem, Osamah Adil
    2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 1 - 3
  • [43] Security: important issue in e-commerce
    Zahra, Ahmadi-Brooghani
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOL 3: ADVANCES IN COMMUNICATIONS, 2007, : 23 - +
  • [44] DSP application in E-commerce security
    Hu, JK
    Xi, ZP
    Jennings, A
    Lee, HYJ
    Wahyudi, D
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING - VOL IV: SIGNAL PROCESSING FOR COMMUNICATIONS; VOL V: SIGNAL PROCESSING EDUCATION SENSOR ARRAY & MULTICHANNEL SIGNAL PROCESSING AUDIO & ELECTROACOUSTICS; VOL VI: SIGNAL PROCESSING THEORY & METHODS STUDENT FORUM, 2001, : 1005 - 1008
  • [45] E-commerce security - it's not an Oxymoron !!
    Blanchfield, Dez
    Telecommunication Journal of Australia, 2000, 50 (04)
  • [46] Research on Pharmaceutical E-commerce and Security
    Xie, Ming
    Liao, Youlian
    ADVANCES IN ASIA-PACIFIC LOW CARBON ECONOMY, 2010, : 493 - 496
  • [47] Research on E-Commerce Security Issues
    Wen, Yuanqiao
    Zhou, Chunhui
    Ma, Juan
    Liu, Kezhong
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 186 - +
  • [48] Sicherheitstechnologien für E-Commerce 2000Security technologies for e-commerce 2000
    R. Fleck
    e&i Elektrotechnik und Informationstechnik, 2000, 117 (6) : 411 - 416
  • [49] Analyzing encryption technology applied in farm product e-commerce system security
    Zhang Chunhua
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL IV, 2007, : 433 - 436
  • [50] Software Technology for E-Commerce Era
    Chen shing Chou e Toyou International Inc.
    Wuhan University Journal of Natural Sciences, 2001, (Z1) : 159 - 163