Affiliation:
1. Harbin University of Commerce
Abstract
With the development of e-commerce, security has been the center of the transaction. This article analyses the technologies of e-commerce and then examines the issues related to the security of assets and transactions in the e-commerce components and activities. After examining the technologies used in e-commerce, the article goes on to identify the security requirement of ecommerce systems from perceived threats and vulnerabilities. Then e-commerce security is viewed as an engineering management problem. And a life cycle approach is put forward.
Publisher
Trans Tech Publications, Ltd.
Reference4 articles.
1. Kalakota, R. and Whinston, A., Frontiers of electronic commerce, Addison-Wesley, Reading, MA (1996).
2. Kalakota, R. and Robinson, M., e-business 2. 0, Addison Wesley, Boston, MA (2001).
3. Schneider G P, Perry J T, Electronic commerce. Course Technology, Cambridge, MA (2001).
4. Varshney U, Vetter R. J, Kalakota R, Mobile commerce: a new frontier. Computer Oct. 32–38(2000).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献