E-business security: Methodological considerations

被引:0
|
作者
Informatics Research Group, Sheffield Hallam University, Howard Street, S1 1WB, Sheffield, United Kingdom [1 ]
机构
来源
World Acad. Sci. Eng. Technol. | 2009年 / 624-631期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] The Security, Privacy, and Solutions of E-Business
    Huang, Hao
    Ma, Yuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 441 - 446
  • [2] Relationship of the properties in the e-business security
    Shen Yan-guang
    Si Chun-jing
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING - MANAGEMENT AND ORGANIZATION STUDIES SECTION, 2007, : 1128 - 1131
  • [3] Algorithm aids e-business security
    不详
    IEEE MICRO, 2001, 21 (01) : 7 - 7
  • [4] Security Design for E-Business Applications
    Vasilyevna, Nadejda Belbus
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 248 - 251
  • [5] Security requirements of E-business processes
    Knorr, K
    Röhrig, S
    TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 73 - 86
  • [6] E-business security in international perspective
    Karmakar, NL
    HUMAN PERSPECTIVES IN THE INTERNET SOCIETY: CULTURE, PSYCHOLOGY AND GENDER, 2004, 4 : 523 - 534
  • [7] Authentication and transaction security in E-business
    Mueller, Lorenz
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 175 - 197
  • [8] Modelling e-business security using business processes
    Nachtigal, S.
    Mitchell, C. J.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +
  • [9] The security policy of e-business based on PKI
    Zhang, CY
    Zhang, LQ
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 655 - 659
  • [10] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184