Sengupta et al., 2005 - Google Patents
e-Commerce security—A life cycle approachSengupta et al., 2005
View PDF- Document ID
- 4855887921099427813
- Author
- Sengupta A
- Mazumdar C
- Barik M
- Publication year
- Publication venue
- Sadhana
External Links
Snippet
The rapid evolution of computing and communication technologies and their standardizations have made the boom in e-commerce possible. Lowering of the cost of operation, increase in the speed of transactions, and easy global reach to customers and …
- 238000004891 communication 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan | Cyber security issues and challenges in E-commerce | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
Salim | Cyber safety: A systems thinking and systems theory approach to managing cyber security risks | |
Herzberg et al. | Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites | |
Sharma et al. | e‐Commerce security: Threats, issues, and methods | |
Raina | PKI security solutions for the Enterprise: solving HIPAA, E-Paper Act, and other compliance issues | |
Gupta et al. | Electronic Banking and Information Assurance Issues: Surveys and Synthesis | |
Hussain | A study of information security in e-commerce applications | |
Rai et al. | Cyber Security | |
Elhag | Enhancing online banking transaction authentication by using tamper proof & cloud computing | |
O’Regan | Computer Crime | |
KACHHIA | CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH | |
Otuteye | Framework for e-business information security management | |
Kohli | E-COMMERCE: TRANSACTION SECURITY ISSUE AND CHALLENGES. | |
Gupta et al. | Electronic banking and information assurance issues: survey and synthesis | |
O’Regan | Cybersecurity and Cybercrime | |
Amanulla et al. | 2014 Cyber-attack on eBay Case Study Analysis | |
Qin et al. | E-Commerce Security Technology | |
Sedaghat | Web authenticity | |
Sullivan | The Shortcut Guide to Extended Validation SSL Certificates | |
Padmannavar | A Review on Ecommerce Security' | |
Mlelwa et al. | CHALLENGES THAT RESTRICT THE EFFICIENCIES OF SECURITY FRAMEWORKS IN E-COMMERCE: A REVIEW | |
Huo | Security Strategy of E-Commerce in China | |
Trcek | E-business systems security for intelligent enterprise | |
Abboud | Security of electronic banking in Lebanon: status and prospects |