[go: up one dir, main page]

Sengupta et al., 2005 - Google Patents

e-Commerce security—A life cycle approach

Sengupta et al., 2005

View PDF
Document ID
4855887921099427813
Author
Sengupta A
Mazumdar C
Barik M
Publication year
Publication venue
Sadhana

External Links

Snippet

The rapid evolution of computing and communication technologies and their standardizations have made the boom in e-commerce possible. Lowering of the cost of operation, increase in the speed of transactions, and easy global reach to customers and …
Continue reading at www.ias.ac.in (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Similar Documents

Publication Publication Date Title
Khan Cyber security issues and challenges in E-commerce
Sengupta et al. e-Commerce security—A life cycle approach
Salim Cyber safety: A systems thinking and systems theory approach to managing cyber security risks
Herzberg et al. Protecting (even) Naive Web Users, or: preventing spoofing and establishing credentials of web sites
Sharma et al. e‐Commerce security: Threats, issues, and methods
Raina PKI security solutions for the Enterprise: solving HIPAA, E-Paper Act, and other compliance issues
Gupta et al. Electronic Banking and Information Assurance Issues: Surveys and Synthesis
Hussain A study of information security in e-commerce applications
Rai et al. Cyber Security
Elhag Enhancing online banking transaction authentication by using tamper proof & cloud computing
O’Regan Computer Crime
KACHHIA CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH
Otuteye Framework for e-business information security management
Kohli E-COMMERCE: TRANSACTION SECURITY ISSUE AND CHALLENGES.
Gupta et al. Electronic banking and information assurance issues: survey and synthesis
O’Regan Cybersecurity and Cybercrime
Amanulla et al. 2014 Cyber-attack on eBay Case Study Analysis
Qin et al. E-Commerce Security Technology
Sedaghat Web authenticity
Sullivan The Shortcut Guide to Extended Validation SSL Certificates
Padmannavar A Review on Ecommerce Security'
Mlelwa et al. CHALLENGES THAT RESTRICT THE EFFICIENCIES OF SECURITY FRAMEWORKS IN E-COMMERCE: A REVIEW
Huo Security Strategy of E-Commerce in China
Trcek E-business systems security for intelligent enterprise
Abboud Security of electronic banking in Lebanon: status and prospects