Security Design for E-Business Applications

被引:1
|
作者
Vasilyevna, Nadejda Belbus [1 ]
机构
[1] Tashkent Univ Informat Technol, Tashkent, Uzbekistan
关键词
e-Business; IT Security; Security Control; e-Business Management;
D O I
10.1109/UMC.2008.57
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a security design for an e-business environment with the use of the three-layered e-business architecture. This security design proposes best practices in general. It involves different stages of the management process (planning, deployment, administration, and auditing) and security control by layers - from physical access, to network communication, to operating systems, to applications. Issues such as security management process analysis, control analysis, and cost-benefits analysis are also discussed.
引用
收藏
页码:248 / 251
页数:4
相关论文
共 50 条
  • [1] Directions for security and privacy for Semantic E-business applications
    Thuraisingham, B
    COMMUNICATIONS OF THE ACM, 2005, 48 (12) : 71 - 73
  • [2] Preserving Consistency and Security of Data in E-business Applications
    Boboila, Cristea
    Constantinescu, Nicolae
    Boldea, Costin-Radu
    RECENT ADVANCES IN MATHEMATICS AND COMPUTERS IN BUSINESS, ECONOMICS, BIOLOGY & CHEMISTRY, 2010, : 211 - +
  • [3] Security features and technologies for E-business architecture design
    Chen, Hao
    Corriveau, Jean-Pierre
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1150 - +
  • [4] E-business security design using process security requirements septet
    Nachtigal, S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 408 - 413
  • [5] The Security, Privacy, and Solutions of E-Business
    Huang, Hao
    Ma, Yuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 441 - 446
  • [6] Relationship of the properties in the e-business security
    Shen Yan-guang
    Si Chun-jing
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING - MANAGEMENT AND ORGANIZATION STUDIES SECTION, 2007, : 1128 - 1131
  • [7] Algorithm aids e-business security
    不详
    IEEE MICRO, 2001, 21 (01) : 7 - 7
  • [8] E-business security: Methodological considerations
    Informatics Research Group, Sheffield Hallam University, Howard Street, S1 1WB, Sheffield, United Kingdom
    World Acad. Sci. Eng. Technol., 2009, (624-631):
  • [9] Security requirements of E-business processes
    Knorr, K
    Röhrig, S
    TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 73 - 86
  • [10] E-business security in international perspective
    Karmakar, NL
    HUMAN PERSPECTIVES IN THE INTERNET SOCIETY: CULTURE, PSYCHOLOGY AND GENDER, 2004, 4 : 523 - 534