CFP last date
20 January 2025
Reseach Article

Application-Level and Database Security for E-Commerce Application

by Pradnya B. Rane, B. B. Meshram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 18
Year of Publication: 2012
Authors: Pradnya B. Rane, B. B. Meshram
10.5120/5638-7896

Pradnya B. Rane, B. B. Meshram . Application-Level and Database Security for E-Commerce Application. International Journal of Computer Applications. 41, 18 ( March 2012), 1-5. DOI=10.5120/5638-7896

@article{ 10.5120/5638-7896,
author = { Pradnya B. Rane, B. B. Meshram },
title = { Application-Level and Database Security for E-Commerce Application },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 18 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number18/5638-7896/ },
doi = { 10.5120/5638-7896 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:29:54.274071+05:30
%A Pradnya B. Rane
%A B. B. Meshram
%T Application-Level and Database Security for E-Commerce Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 18
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today's distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an underlying database. The combination of these technologies creates a system that requires attention to the security issues of each component and the system as a whole. Hence security related to authentication, authorization and transaction database need to be managed carefully.

References
  1. Vijay Ahuja," Building Trust in Electronic Commerce", IEEE/2000
  2. Stuart Feldman, "The Changing Face of E-Commerce: Extending the Boundaries of the Possible", IEEE INTERNET COMPUTING, MAY • JUNE 2000
  3. Timothy E. Lindquist, "Security Considerations for Distributed Web-Based e-commerce Applications in Java", IEEE/2002
  4. Adam Jolly, "The Secure Online Business" (Great Britain and the United States- Kogan Page Limited 2003)
  5. Donal O. Mahony, Michael Peirce Hitesh Tewari, "Electronic Payment Systems for E-Commerce" (Artech House computer security series-Boston 2001)
  6. Rafae Bhatti, Elisa Bertino, Arif Ghafoor, "XML-Based Specification for Web Services Document Security", IEEEE 2004
  7. Sung-Ming Yen and Chi-Sung Laih, "Improved Digital Signature Algorithm", IEEE TRANSACTIONS ON COMPUTERS, VOL. 44, NO. 5. MAY 1995
  8. L. Harn," Enhancing the security of EIGamal's signature Scheme," IEEE Vol. 142, No. 5, September 1995
  9. Simson L. Garfinkel, "Public key cryptography", June-1996
  10. Ingemar J. Cox, Senior Member, IEEE, and Jean-Paul M. G. Linnartz, "Some General Methods for Tampering with Watermarks", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
  11. Jana Dittmann, "Using Cryptographic and Watermarking Algorithms", IEEE/2001
  12. Kjell Orsborn, "E-COMMERCE and SECURITY", Spring 2008
  13. PATRICIA BEATTY, IAN REAY, SCOTT DICK, and JAMES MILLER, "Consumer Trust in E-Commerce Web Sites: A Meta-Study", ACM Computing Surveys, Vol. 43, No. 3, Article 14, Publication date: April 2011
  14. PETER C. CHAPIN, CHRISTIAN SKALKA, and X. SEAN WANG," Authorization in Trust Management: Features and Foundations", ACM Computing Surveys, Vol. 40, No. 3, Article 9, Publication date: August 2008.
  15. Nagarjuna. Settipalli,, R Manjula, "Securing Watermarked-Relational Data by Using Encryption and Decryption", Volume 1 No. 2, MAY 2011 , ARPN Journal of Systems and Software.
  16. Dieter Gollmann, "E-commerce security", COMPUTING AND CONTROL ENGINEERING JOURNAL, JUNE 2000
  17. Radu Sion, Mikhail Atallah, Fellow, IEEE, and Sunil Prabhakar, "Rights Protection for Relational Data", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 12, DECEMBER 2004
  18. Yingjiu Li, Member, IEEE, Vipin Swarup, and Sushil Jajodia, Senior Member, IEEE," Fingerprinting Relational Databases:Schemes and Specialties", IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2005
  19. Shiuh-Jeng Wang, Jia-Hung Huang, Concerns about Hash Cracking Aftereffect on Authentication Procedures in Applications of Cyberspace , IEEE A&E SYSTEMS MAGAZINE, JANUARY 20073
  20. Xiangrong Xiao Xingming Sun Minggang Chen, Second-LSB-Dependent Robust Watermarking for Relational Database , 0-7695-2876-7/07 $25. 00 © 2007 IEEE DOI 10. 1109/IAS. 2007. 25
  21. Haiting Cui, Xinchun Cui, Mailing Meng, A Public Key Cryptography Based Algorithm for Watermarking Relational Databases* , 978-0-7695-3278-3/08 $25. 00 © 2008 IEEE DOI 10. 1109/IIH-MSP. 2008. 194
  22. Jianhua Sun,Zaihui Cao, Zhongyan Hu ,Multiple Watermarking Relational Databases Using Image , 978-0-7695-3556-2/08 $25. 00 © 2008 IEEE DOI 10. 1109/MMIT. 2008. 211
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Watermarking Steganography Salt Hashing