Abstract
One of the key issues emerged in the process of transforming a traditional business into an electronic one is the security problem. Compared with tradition paper-aided transaction, information has to be transferred through public Internet network under the electronic environment. The record media of e-commerce has changed from paper to magnetic media. The characteristics that the information recorded on magnetic media can be easily copied, deleted and modified, and the openness of Internet result in that e-commerce information can be easily leaked, tampered, counterfeited and denied. In order to develop e-commerce, the confidentiality, integrity and authentication of e-commerce transaction data must be ensured. The technologies used to handle these issues mainly come from cryptography, and they include such technologies as encryption, authentication, hash, digital signature, firewall, intrusion detection etc. This chapter gives a brief description on those mentioned technologies which gives a basic understanding of how they work so that we can consciously apply these technologies to protect the security of e-commerce during the business process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Qin Z., Li S D. An Compendium to E-Commerce. Beijing: Higher Education Press, 2001.
Qin Z., Li S D., Zhang L., Xie G T. & Yan L X. An Introduction to E-Commerce. Beijing: People’s Post and Telecommunication Press, 2000.
Qin Z., Li S D., Yan L X. & Dou J W. E-Commerce and International Trade. Beijing: People’s Post and Telecommunication Press, 2001.
Qin Z., Yue P. & Tian W Y. E-Commerce and Law. Beijing: People’s Post and Telecommunication Press, 2001.
Qin Z., Xie G T., Li S D., & Jia X L. E-Commerce System Structure and System Design. Xi’an: Xi’an Jiaotong University Press, 2001.
Qin Z., Han Y. & Yan L X. Computer System Intergration and E-commerce. Xi’an: Xi’an Jiaotong University Press, 2001.
Qin Z., Wang Z M. & Bao F M. Design Practice of Virtual Network. Xi’an: Xi’an Jiaotong University Press, 2001.
Qin Z., Liu X Y. & Wang LR. Case Study on E-commerce. Xi’an: Xi’an Jiaotong University Press, 2001.
Qin Z., Wang Y L., Zhang L. & Wei M T. Virtual Business Management. Xi’an: Xi’an Jiaotong University Press, 2001.
Weaver, A.C. Vetter, R.J. Whinston, A.B. Swigger, K. The future of E-commerce. Computer, Volume: 33 Issue: 10, Oct. 2000, 30–31.
Jarvis, N. E-Commerce And Encryption: Barriers To Growth. Computers & Security, Vol: 18. Issue: 5, 1999, 429–431.
C. M, D. Galai, R. Mark, A comparative analysis of current credit risk models. Journal of Banking&Fiance. Vol.24: 59–117, 2000.
DeFazio, S. Krishnan, R. Srinivasan, J. Zeldin, S. The Importance of Extensible Database Systems for E-commerce. Data Engineering, 2001. Proceedings. 17th International Conference on, 2001, 63–70.
Papa, M. Bremer, O. Hale, J. Shenoi, S. Formal Analysis of E-commerce Protocol. Autonomous Decentralized Systems, 2001. Proceedings. 5th International Symposium on, 2001, 19–28.
Zaba, S. Tools and Protocols for E-Commerce. Information Security Technical Report, Vol: 1999, 1999, 23–30.
Yuan R. How to Choose Web Servers. Computer World, 2000.
S. Kesh, S. Ramanujan, S. Nerur. A framework for analyzing e-commerce security. Information Management & Computer Security, Vol.10(4): 149–158, 2002.
H. Kim, Y. G. Han, S. H. Kim. A Curriculum Design for E-commerce Security. Journal of Information Systems Education. Vol. 16(1): 55–64, 2001.
Yao L X. E-commerce Perspective. Beijing: Business Administration Press, 1999.
E. C. Tan, P. C. Leong, L. T. Sio. Group-Access Control of Confidential Files in E-Commerce Management Using Shared-Secret Scheme. Electronic Commerce Research, Vol.2(1–2):151–158, 2002.
Ma M H. Principles and Techniques of Computer Information System Safety Law. Xi’an: Shanxi People’s Press, 2000.
Wang Q W. The Current Situation of E-commerce Development of the World and the Strategies of E-commerce Development in Our Country. Journal of Tsinghua University (Philosophy and social science edition ), 1999.
Pi Y. On Technological Crime in the Field of Finance. Legal Science Review, 2000.
Qu X W. Crime on Internet and Its Containing. Legal Science Study, 2000.
Wang Y. A Brief Analysis on E-commerce Law Issues. Legal Science Review, 2000.
A. Saunders, L. Allen. Credit Risk Measurement: New Approaches to Value at Risk and other Paradigms. New Jersey: John Wiley & Sons Inc., 1999.
Jim Walker. CHANDRA DEVI. Advance with Certification Programmes. Computimes Malaysia, New York; Aug. 6, 2001.
Van Dyke Parunak, H. A Practitioners&apos. Review of Industrial Agent Applications. Autonomous Agents and Multi-Agent Systems; 1387–2532; No.4, Vol (3), 2000.
Erosion of the Concept of Permanent Establishment: Electronic Commerce Skaar, Arvid Aage; Intertax; 0165–2826; No.5(28), 2005.
Michael J. Electronic Commerce: Integration of Web Technologies with Business Models Shaw. Information Systems Frontiers; 1387–3326; Volume 1, Issue 4, 2004.
B. Golany, O. Shmueli. A quantitative foundation for defining and manipulating deals to facilitate automated e-commerce. Electron Commerce Research, Vol. 7(3–4): 341–365, 2007.
Porra, Jaana. Electronic Commerce Internet Strategies and Business Models-A Survey. Information Systems Frontiers; 1387–3326; No.4(1), 2000.
Sandholm, Tuomas. Agents in Electronic Commerce: Component Technologies for Automated Negotiation and Coalition Formation. Autonomous Agents and Multi-Agent Systems; 1387–2532; No.1(3), 2000.
Shaw, Michael J. Building an E-Business from Enterprise Systems. Information Systems Frontiers; 1387–3326; No.1(2), 2000.
Arora, Ashish, Cooper, Gregory, Krishnan, Ramayya, Padman, Rema. IBIZA: E-market Infrastructure for Custom-built Information Products. Information Systems Frontiers; 1387–3326; No.1(2), 2000.
Garrett, S. G. E.; Skevington, P. J. An Introduction to Electronic Commerce. BT Technology Journal; 1358–3948; No.3(17), 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Tsinghua University Press, Beijing and Springer-Verlag GmbH Berlin Heidelberg
About this chapter
Cite this chapter
Zheng, Q., Li, S., Han, Y., Dong, J., Yan, L., Qin, J. (2009). Security Technologies in E-commerce. In: Zheng, Q. (eds) Introduction to E-commerce. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-49645-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-49645-8_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49644-1
Online ISBN: 978-3-540-49645-8
eBook Packages: Computer ScienceComputer Science (R0)