Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems
Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 8)Publication Date: 2013-08-05
Authors : Tanvir Tahir; Kamar Abbas;
Page : 393-405
Keywords : e-commerce; malicious user; Sniffing; Spoofing; Brute-force; Cryptography & Decryption;
Abstract
In this paper, we provide a detailed description of methodology for deriving and applying Electronic Commerce (EC) security countermeasures design models from the existing IT standards. Our goal is to describe a model-based approach of how to extend such a model or specialize it in order to apply it to e-commerce systems.
Other Latest Articles
- Mechanical Properties and Morphological Studies on Pu-Ha Biocomposite
- Role of Modern Technology in Fighting Stigma Related to HIV/AIDS
- A Focus on Layer Aspects of Mobile Computing
- Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
- Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Last modified: 2021-06-30 20:21:07