E-business security: Methodological considerations

被引:0
|
作者
Informatics Research Group, Sheffield Hallam University, Howard Street, S1 1WB, Sheffield, United Kingdom [1 ]
机构
来源
World Acad. Sci. Eng. Technol. | 2009年 / 624-631期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Smart cards and digital signatures for e-business security
    Patriciu, VV
    Podaru, V
    Bica, I
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 124 - 129
  • [32] On a new approach for e-business security - Network forensics
    Wei, R
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 516 - 522
  • [33] Research of E-Business Security Based on SOAP Protocol
    Wang, Yiran
    MANUFACTURING PROCESS TECHNOLOGY, PTS 1-5, 2011, 189-193 : 4304 - 4307
  • [34] Trust, privacy and security in e-business: Requirements and solutions
    Katsikas, SK
    Lopez, J
    Pernul, G
    ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 548 - 558
  • [35] Architecture environments for E-business agent based on security
    Shin, HJ
    Lee, SG
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 625 - 634
  • [36] E-business
    Chemical and Engineering News, 2001, 79 (28):
  • [37] e-business
    Anon
    Packaging Magazine, 2001, 4 (19):
  • [38] E-business
    Hart's E and P, 2000, 73 (08):
  • [40] E-business
    2001, McGraw-Hill Companies (78):