Skip to main content

Security Technologies in E-commerce

  • Chapter
Introduction to E-commerce
  • 5605 Accesses

Abstract

One of the key issues emerged in the process of transforming a traditional business into an electronic one is the security problem. Compared with tradition paper-aided transaction, information has to be transferred through public Internet network under the electronic environment. The record media of e-commerce has changed from paper to magnetic media. The characteristics that the information recorded on magnetic media can be easily copied, deleted and modified, and the openness of Internet result in that e-commerce information can be easily leaked, tampered, counterfeited and denied. In order to develop e-commerce, the confidentiality, integrity and authentication of e-commerce transaction data must be ensured. The technologies used to handle these issues mainly come from cryptography, and they include such technologies as encryption, authentication, hash, digital signature, firewall, intrusion detection etc. This chapter gives a brief description on those mentioned technologies which gives a basic understanding of how they work so that we can consciously apply these technologies to protect the security of e-commerce during the business process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Qin Z., Li S D. An Compendium to E-Commerce. Beijing: Higher Education Press, 2001.

    Google Scholar 

  2. Qin Z., Li S D., Zhang L., Xie G T. & Yan L X. An Introduction to E-Commerce. Beijing: People’s Post and Telecommunication Press, 2000.

    Google Scholar 

  3. Qin Z., Li S D., Yan L X. & Dou J W. E-Commerce and International Trade. Beijing: People’s Post and Telecommunication Press, 2001.

    Google Scholar 

  4. Qin Z., Yue P. & Tian W Y. E-Commerce and Law. Beijing: People’s Post and Telecommunication Press, 2001.

    Google Scholar 

  5. Qin Z., Xie G T., Li S D., & Jia X L. E-Commerce System Structure and System Design. Xi’an: Xi’an Jiaotong University Press, 2001.

    Google Scholar 

  6. Qin Z., Han Y. & Yan L X. Computer System Intergration and E-commerce. Xi’an: Xi’an Jiaotong University Press, 2001.

    Google Scholar 

  7. Qin Z., Wang Z M. & Bao F M. Design Practice of Virtual Network. Xi’an: Xi’an Jiaotong University Press, 2001.

    Google Scholar 

  8. Qin Z., Liu X Y. & Wang LR. Case Study on E-commerce. Xi’an: Xi’an Jiaotong University Press, 2001.

    Google Scholar 

  9. Qin Z., Wang Y L., Zhang L. & Wei M T. Virtual Business Management. Xi’an: Xi’an Jiaotong University Press, 2001.

    Google Scholar 

  10. Weaver, A.C. Vetter, R.J. Whinston, A.B. Swigger, K. The future of E-commerce. Computer, Volume: 33 Issue: 10, Oct. 2000, 30–31.

    Article  Google Scholar 

  11. Jarvis, N. E-Commerce And Encryption: Barriers To Growth. Computers & Security, Vol: 18. Issue: 5, 1999, 429–431.

    Article  Google Scholar 

  12. C. M, D. Galai, R. Mark, A comparative analysis of current credit risk models. Journal of Banking&Fiance. Vol.24: 59–117, 2000.

    Google Scholar 

  13. DeFazio, S. Krishnan, R. Srinivasan, J. Zeldin, S. The Importance of Extensible Database Systems for E-commerce. Data Engineering, 2001. Proceedings. 17th International Conference on, 2001, 63–70.

    Google Scholar 

  14. Papa, M. Bremer, O. Hale, J. Shenoi, S. Formal Analysis of E-commerce Protocol. Autonomous Decentralized Systems, 2001. Proceedings. 5th International Symposium on, 2001, 19–28.

    Google Scholar 

  15. Zaba, S. Tools and Protocols for E-Commerce. Information Security Technical Report, Vol: 1999, 1999, 23–30.

    Google Scholar 

  16. Yuan R. How to Choose Web Servers. Computer World, 2000.

    Google Scholar 

  17. S. Kesh, S. Ramanujan, S. Nerur. A framework for analyzing e-commerce security. Information Management & Computer Security, Vol.10(4): 149–158, 2002.

    Article  Google Scholar 

  18. H. Kim, Y. G. Han, S. H. Kim. A Curriculum Design for E-commerce Security. Journal of Information Systems Education. Vol. 16(1): 55–64, 2001.

    Google Scholar 

  19. Yao L X. E-commerce Perspective. Beijing: Business Administration Press, 1999.

    Google Scholar 

  20. E. C. Tan, P. C. Leong, L. T. Sio. Group-Access Control of Confidential Files in E-Commerce Management Using Shared-Secret Scheme. Electronic Commerce Research, Vol.2(1–2):151–158, 2002.

    Article  Google Scholar 

  21. Ma M H. Principles and Techniques of Computer Information System Safety Law. Xi’an: Shanxi People’s Press, 2000.

    Google Scholar 

  22. Wang Q W. The Current Situation of E-commerce Development of the World and the Strategies of E-commerce Development in Our Country. Journal of Tsinghua University (Philosophy and social science edition ), 1999.

    Google Scholar 

  23. Pi Y. On Technological Crime in the Field of Finance. Legal Science Review, 2000.

    Google Scholar 

  24. Qu X W. Crime on Internet and Its Containing. Legal Science Study, 2000.

    Google Scholar 

  25. Wang Y. A Brief Analysis on E-commerce Law Issues. Legal Science Review, 2000.

    Google Scholar 

  26. A. Saunders, L. Allen. Credit Risk Measurement: New Approaches to Value at Risk and other Paradigms. New Jersey: John Wiley & Sons Inc., 1999.

    Google Scholar 

  27. Jim Walker. CHANDRA DEVI. Advance with Certification Programmes. Computimes Malaysia, New York; Aug. 6, 2001.

    Google Scholar 

  28. Van Dyke Parunak, H. A Practitioners&apos. Review of Industrial Agent Applications. Autonomous Agents and Multi-Agent Systems; 1387–2532; No.4, Vol (3), 2000.

    Google Scholar 

  29. Erosion of the Concept of Permanent Establishment: Electronic Commerce Skaar, Arvid Aage; Intertax; 0165–2826; No.5(28), 2005.

    Google Scholar 

  30. Michael J. Electronic Commerce: Integration of Web Technologies with Business Models Shaw. Information Systems Frontiers; 1387–3326; Volume 1, Issue 4, 2004.

    Google Scholar 

  31. B. Golany, O. Shmueli. A quantitative foundation for defining and manipulating deals to facilitate automated e-commerce. Electron Commerce Research, Vol. 7(3–4): 341–365, 2007.

    Article  MATH  Google Scholar 

  32. Porra, Jaana. Electronic Commerce Internet Strategies and Business Models-A Survey. Information Systems Frontiers; 1387–3326; No.4(1), 2000.

    MathSciNet  Google Scholar 

  33. Sandholm, Tuomas. Agents in Electronic Commerce: Component Technologies for Automated Negotiation and Coalition Formation. Autonomous Agents and Multi-Agent Systems; 1387–2532; No.1(3), 2000.

    Google Scholar 

  34. Shaw, Michael J. Building an E-Business from Enterprise Systems. Information Systems Frontiers; 1387–3326; No.1(2), 2000.

    Google Scholar 

  35. Arora, Ashish, Cooper, Gregory, Krishnan, Ramayya, Padman, Rema. IBIZA: E-market Infrastructure for Custom-built Information Products. Information Systems Frontiers; 1387–3326; No.1(2), 2000.

    Google Scholar 

  36. Garrett, S. G. E.; Skevington, P. J. An Introduction to Electronic Commerce. BT Technology Journal; 1358–3948; No.3(17), 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Tsinghua University Press, Beijing and Springer-Verlag GmbH Berlin Heidelberg

About this chapter

Cite this chapter

Zheng, Q., Li, S., Han, Y., Dong, J., Yan, L., Qin, J. (2009). Security Technologies in E-commerce. In: Zheng, Q. (eds) Introduction to E-commerce. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-49645-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-49645-8_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49644-1

  • Online ISBN: 978-3-540-49645-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics