[go: up one dir, main page]

Trcek, 2005 - Google Patents

E-business systems security for intelligent enterprise

Trcek, 2005

View PDF
Document ID
11395178079611884574
Author
Trcek D
Publication year
Publication venue
Encyclopedia of Information Science and Technology, First Edition

External Links

Snippet

Security became a topic of research with the introduction of networked information systems, or networked IS, in the early eighties. In the mid-nineties the proliferation of the Internet in the business area exposed security as one of the key factors for successful online business …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Trèek An integral framework for information systems security management
Vacca Public key infrastructure: building trusted applications and Web services
US20060248205A1 (en) A Secure Virtual Network Layer and Virtual Network Manager that Establishes a Comprehensive Business Reporting and Security Infrastructure as an Integral Part of the Network
JP2009518762A (en) A method for verifying the integrity of a component on a trusted platform using an integrity database service
Sengupta et al. e-Commerce security—A life cycle approach
US7194759B1 (en) Used trusted co-servers to enhance security of web interaction
WO2001033359A1 (en) Netcentric computer security framework
Borselius Multi-agent system security for mobile communication
Gupta et al. Electronic Banking and Information Assurance Issues: Surveys and Synthesis
Rai et al. Cyber Security
Virtue Payment card industry data security standard handbook
Shoniregun Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES)
Elhag Enhancing online banking transaction authentication by using tamper proof & cloud computing
CN100476750C (en) Computer activity monitoring and recording system and method
Trcek E-business systems security for intelligent enterprise
Georg et al. Aspect-oriented risk driven development of secure applications
Trèek E-Business Systems Security for Intelligent Enterprises
Zhang et al. Controlling information risk in E-commerce
Subhani et al. Smarter world, bigger threats: Understanding the internet of things
Kumar et al. Analysis of cloud security framework using blockchain technology
Gupta et al. Electronic banking and information assurance issues: survey and synthesis
Krutz et al. The CISM prep Guide: Mastering the five Domains of Information security management
Qin et al. E-Commerce Security Technology
Sedaghat Web authenticity
KACHHIA CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH