[go: up one dir, main page]

Ghosh, 1998 - Google Patents

E-Commerce security: No Silver Bullet

Ghosh, 1998

Document ID
17181176250634629447
Author
Ghosh A
Publication year
Publication venue
Database Security XII: Status and Prospects

External Links

Snippet

Electronic commerce has come out of its infancy, re-buffed its nay-sayers, and is now a multi- billion dollar industry. The success of early adopters in electronic commerce has now led the pragmatist herd in participating in on-line commerce. It is now a staple of advertising to …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Similar Documents

Publication Publication Date Title
US8626935B1 (en) Identifying use of software applications
Goncharov Russian underground 101
US20080028444A1 (en) Secure web site authentication using web site characteristics, secure user credentials and private browser
Wright et al. Cyber security and mobile threats: The need for antivirus applications for smart phones
Sengupta et al. e-Commerce security—A life cycle approach
Wedman et al. An analytical study of web application session management mechanisms and HTTP session hijacking attacks
Nabi Secure business application logic for e-commerce systems
Khan Research Article E-banking: Online Transactions and Security Measures
Ghosh E-Commerce security: No Silver Bullet
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
Weiss CompTIA Security+ SY0-601 Exam Cram
Ankele et al. SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures
Wueest The state of financial Trojans 2014
Al-Dwairi et al. Business-to-consumer e-commerce Web Sites: Vulnerabilities, Threats and quality evaluation model
Gupta et al. Server side protection against cross site request forgery usingcsrf gateway
Mihai Overview on phishing attacks
Orucho et al. Assessing Operation of Mobile Banking Applications that Support Customers to Access Banking Services Remotely
MACENA CYBER SECURITY AND DATA PROTECTION
Nidhyananthan et al. Cyber Profiteering in the Cloud of Smart things
Thanki et al. Online Banking Operating Pattern and Risk of Cyber Fraud-Findings from Empirical Research
Rijah et al. Security Issues and Challenges in Windows OS Level
Liu An Investigation of Cryptojacking: Malware Analysis and Defense Strategies
Sharma et al. Web Security Analysis of Banking Websites
O’Regan Cybersecurity and Cybercrime
Mooney et al. Your Guide to Authenticating Mobile Devices