Title :
Probe into E-Commerce Security Technology
Author :
Qingping, Ge ; Li, Feng ; Li, Yang
Author_Institution :
Inf. Eng. Coll., Capital Normal Univ., Beijing, China
Abstract :
Among all the restraints of the development of e-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of e-commerce security technologies have attracted more and more attention and study. In order to find better solutions of e-commerce security problems, such as anti-wiretapping, anti-juggling of the information, transaction denying, and the false order form or contract and so on. According to the ISO Open Systems interconnect seven layer protocol models, the e-commerce security system can be divided into five layers that network service layer, encryption technology layer, secure authentication layer, security protocol layer and application layer. Based on these five layers, make an instruction and analysis of the current technology used most in E-commerce security area, such as firewall technology, encryption technology, authentication technology as well as security protocol; and then put forward some suggestions.
Keywords :
authorisation; cryptographic protocols; electronic commerce; ISO Open Systems interconnect seven layer protocol models; anti-juggling; anti-wiretapping; application layer; e-commerce security technology; encryption technology layer; false order form; firewall technology; network service layer; secure authentication layer; security protocol layer; transaction; transaction denyial; Authentication; Computer networks; Computer security; Cryptography; Data security; Electronic commerce; Information security; Probes; Protocols; Software safety; E-commerce security system1; ID authentication3; encryption techniques2; firewall4; security protocol5;
Conference_Titel :
Computer Science-Technology and Applications, 2009. IFCSTA '09. International Forum on
Conference_Location :
Chongqing
Print_ISBN :
978-0-7695-3930-0
Electronic_ISBN :
978-1-4244-5423-5
DOI :
10.1109/IFCSTA.2009.226