CFP last date
20 December 2024
Reseach Article

A Security Framework for E-Business Applications

by Anuradha Sharma, Puneet Misra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 7
Year of Publication: 2014
Authors: Anuradha Sharma, Puneet Misra
10.5120/17830-8688

Anuradha Sharma, Puneet Misra . A Security Framework for E-Business Applications. International Journal of Computer Applications. 102, 7 ( September 2014), 30-34. DOI=10.5120/17830-8688

@article{ 10.5120/17830-8688,
author = { Anuradha Sharma, Puneet Misra },
title = { A Security Framework for E-Business Applications },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 7 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number7/17830-8688/ },
doi = { 10.5120/17830-8688 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:32.041672+05:30
%A Anuradha Sharma
%A Puneet Misra
%T A Security Framework for E-Business Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 7
%P 30-34
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

During the electronic business, the clients and the merchants make use of the internet. Thus, we can say that the internet, the client, and the merchant are the components for the electronic business. The Electronic Business involves various categories of businesses. These various types of e-businesses have different types of security requirements to keep the businesses secure. The threats to these types of businesses prohibit people from believing on them. Except highly educated, people often do not take much interest in believing much on the services provided by e-businesses because of the problems of security in doing these types of businesses. We are proposing here a framework that can be implemented on various categories of e-business so that it can be trusted by most of the people. The framework can be used to define the possibilities of threats for the various categories. Using these possibilities, it is possible to give a prediction of the level of security needed for these categories.

References
  1. A Sengupta,C. Mazumdar, M. S. Barik, "E-commerce Security-A Lifecycle Approach", Sadhana, vol. 30, Parts 2&3, April/June 2005, pp. 119-140.
  2. Zwass Vladimir, "E Commerce: Structures and issues", International Journal of Electronic Commerce, 1(1):3-23, 1996.
  3. Nabil, Adam R. ; Yesha, Yelena (Eds. ), "Electronic commerce: Current Research issues and Applications", LNCS 1028, Springer, Heidelberg, 1996.
  4. Lacoste, G. ; Pfitzmann, B. ; Steiner, M. ; Waidner, M. (Hrsg. ), "SEMPER- Secure Electronic Marketplace for Europe", LNCS 1854, Springer, 2000.
  5. Knorr, Konstantin; Röhrig, Susanne, "security of electronic business applications- Structure and Quantification", In: Proceedings of the 1st International Conference on Electronic Commerce and Web Technologies EC-Web 2000, Greenwich, UK, Sep. 2000, pp. 25-37.
  6. Röhrig, Susanne; Knorr, Konstantin; Noser, Hansrudi. , WIRTSCHAFTSINFORMATIK, 42(2000) 6: 499-507
  7. Konstantin Knorr, Susanne Röhrig, "Security requirements of e-business processes", Volume 202 of IFIP Conference Proceedings, pages 73-86, Kluwer, 2001.
  8. N. Smith, L. Ferreira, E. Mead, "E-Business Treands", Working Paper 2 of the E- Business and Transport Project for The National Transport Secretariat.
  9. SET Secure Electronic Transaction Specification. Book 1: Business Description, Version1. 0, http://www. setco. org, 1997.
  10. O. SamySayadjari, "Multilevel Security: Reprise," IEEE Security and Privacy, vol. 3, no. 5, 2004.
  11. Lausen H. ,Polleres A. ,RomanD. , "Web Service Modeling Ontology (WSMO)" Http://www. w3. org/Submission/WSMO/, 2005
  12. Singh, M. P. , "Introduction to web semantics, The Practical Handbook of Internet Computing", pp29-1-29-13, Chapman & Hall/CRC2005, 2005
  13. Randy C. Marchany, Joseph G. Tront, "E-Commerce Security Issues", Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.
  14. Saugata,B. , and Masud,R,R. (2007, " Implementing E-Governance Using OECD Model(Modified) and Gartner Model (Modified) Upon Agriculture of Bangladesh", IEEE. 1-4244-1551-9/07.
Index Terms

Computer Science
Information Sciences

Keywords

Ttransaction threats and vulnerabilities