E-Commerce Authentication: An Effective Countermeasures Design Model

نویسندگان

  • Victor D. Sawma
  • Robert L. Probert
چکیده

Existing authentication models for e-commerce systems take into account satisfying legitimate user requirements described in security standards. Yet, the process of introducing countermeasures to block malicious user requirements is ad hoc and relies completely on the security designer expertise. This leads to expensive implementation life cycles if defects related to the design model were discovered during the system-testing phase. In this paper, we describe an authentication countermeasures design model for ecommerce systems. This model includes effective countermeasures against all known malicious user requirements and attacks. The described model is preventive in nature and can be used with other authentication models or can be implemented as a stand-alone module for e-commerce systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

E-Commerce Security A New Methodology for Deriving Effective Countermeasures Design Models

............................... ................................ ................................ .................. List of Figures................................ ................................ ................................ .........

متن کامل

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates

Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms—if decoupled from SSL/TLS session establishment—are vulnerable to man-in-the-middle attacks. In this article, we examine the feasibility of such attacks, survey countermeasures, and explain the rationale behind SSL/TLS session-aware user authentication as a lightweight an...

متن کامل

Identification of factors influencing building initial trust in e-commerce

Nowadays, consumer trust is identified as one of the most important factors in electronic commerce (e-commerce) growth. This has led much research to investigate the role of trust in e-commerce and determine the factors which influence trust in this area. This paper explores factors which are engaged in building initial consumer trust in online shopping when a consumer wants to buy from a websi...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003