Trcek, 2005 - Google Patents
E-business systems security for intelligent enterpriseTrcek, 2005
View PDF- Document ID
- 11395178079611884574
- Author
- Trcek D
- Publication year
- Publication venue
- Encyclopedia of Information Science and Technology, First Edition
External Links
Snippet
Security became a topic of research with the introduction of networked information systems, or networked IS, in the early eighties. In the mid-nineties the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business …
- 238000000034 method 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Trèek | An integral framework for information systems security management | |
Vacca | Public key infrastructure: building trusted applications and Web services | |
US20060248205A1 (en) | A Secure Virtual Network Layer and Virtual Network Manager that Establishes a Comprehensive Business Reporting and Security Infrastructure as an Integral Part of the Network | |
JP2009518762A (en) | A method for verifying the integrity of a component on a trusted platform using an integrity database service | |
Sengupta et al. | e-Commerce security—A life cycle approach | |
US7194759B1 (en) | Used trusted co-servers to enhance security of web interaction | |
WO2001033359A1 (en) | Netcentric computer security framework | |
Borselius | Multi-agent system security for mobile communication | |
Gupta et al. | Electronic Banking and Information Assurance Issues: Surveys and Synthesis | |
Rai et al. | Cyber Security | |
Virtue | Payment card industry data security standard handbook | |
Shoniregun | Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES) | |
Elhag | Enhancing online banking transaction authentication by using tamper proof & cloud computing | |
CN100476750C (en) | Computer activity monitoring and recording system and method | |
Trcek | E-business systems security for intelligent enterprise | |
Georg et al. | Aspect-oriented risk driven development of secure applications | |
Trèek | E-Business Systems Security for Intelligent Enterprises | |
Zhang et al. | Controlling information risk in E-commerce | |
Subhani et al. | Smarter world, bigger threats: Understanding the internet of things | |
Kumar et al. | Analysis of cloud security framework using blockchain technology | |
Gupta et al. | Electronic banking and information assurance issues: survey and synthesis | |
Krutz et al. | The CISM prep Guide: Mastering the five Domains of Information security management | |
Qin et al. | E-Commerce Security Technology | |
Sedaghat | Web authenticity | |
KACHHIA | CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH |