Security Design for E-Business Applications

被引:1
|
作者
Vasilyevna, Nadejda Belbus [1 ]
机构
[1] Tashkent Univ Informat Technol, Tashkent, Uzbekistan
关键词
e-Business; IT Security; Security Control; e-Business Management;
D O I
10.1109/UMC.2008.57
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a security design for an e-business environment with the use of the three-layered e-business architecture. This security design proposes best practices in general. It involves different stages of the management process (planning, deployment, administration, and auditing) and security control by layers - from physical access, to network communication, to operating systems, to applications. Issues such as security management process analysis, control analysis, and cost-benefits analysis are also discussed.
引用
收藏
页码:248 / 251
页数:4
相关论文
共 50 条
  • [11] Authentication and transaction security in E-business
    Mueller, Lorenz
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 175 - 197
  • [12] Modelling e-business security using business processes
    Nachtigal, S.
    Mitchell, C. J.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +
  • [13] A security blueprint for e-business applications based on the three-tier architecture
    Du, J
    Jiao, JX
    Li, XD
    2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 879 - 884
  • [14] Measurement of Firm E-business Capability to Manage and Improve Its E-business Applications
    Yoon, Chui Young
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 101 - 107
  • [15] The security policy of e-business based on PKI
    Zhang, CY
    Zhang, LQ
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 655 - 659
  • [16] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184
  • [17] Research on the evaluation in alliance e-business security
    Lu Xi
    Zhang Xiaoyu
    Zhu Aimin
    Yu Lijuan
    2010 INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING: IC4E 2010, PROCEEDINGS, 2010, : 74 - 78
  • [18] The Information Security Management Systems in E-Business
    Bolek, Vladimir
    Romanova, Anita
    Korcek, Frantisek
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2023, 31 (01) : 27 - 29
  • [19] AWARENESS ON DIGITAL SECURITY AND E-BUSINESS IN NIGERIA
    Odiboh, Oscar
    Ben-Enukora, Charity
    Oresanya, Toluwalope
    Yartey, Darlington
    Aiyelabola, Ayoola
    4TH INTERNATIONAL CONFERENCE ON EDUCATION, SOCIAL SCIENCES AND HUMANITIES (SOCIOINT 2017), 2017, : 1402 - 1408
  • [20] E-BUSINESS APPLICATIONS IN ENGINEERING EDUCATION
    Zascerinska, Jelena
    Ahrens, Andreas
    ICE-B 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, 2010, : 41 - 46