Secure E-commerce Protection Profile

نویسندگان

  • Anil Kumar Venkataiahgari
  • Mourad Debbabi
  • J. William Atwood
چکیده

We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared in accordance with the Common Criteria (CC), Version 2.1, as specified by the ISO 15408 standard. The SEPP states the requirements that sessions must satisfy in order to respond to the needs of e-commerce. The Target of Evaluation (TOE) security environment, which is composed of threat agents, vulnerabilities, attacks and threats, is described in detail. It is followed by describing the administrative security policies that are necessary to safeguard the TOE or its operating environment. The risks to the TOE are identified. The security objectives for the TOE are stated.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Payment Protocol 3D by Using Cloud Messaging

The popularity of mobile platforms makes them a good candidate for electronic payment. However, there are challenges in this field such as privacy protection, security, the bandwidth limitations of mobile networks, and the limited capabilities of mobile devices. Traditional e-commerce payment protocols were designed to keep track of traditional flows of data, are vulnerable to attacks and are n...

متن کامل

Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property

The advent of the Web, electronic commerce and the creation of electronic distribution channels for content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising method is th...

متن کامل

Privacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation

With the evolution of the Internet, collaborative filtering techniques are becoming increasingly popular in E-commerce recommender systems. Such techniques recommend items to users employing similar users' preference data. People use recommender systems to cope with information overload. Although collaborative filtering systems are widely used by E-commerce sites, they fail to protect users' pr...

متن کامل

A Review: Digital Rights Management Sustainable Development in e-Commerce

Strong encryption is an urgent need for e-commerce development, since it allows the privacy and secure transactions of the financial and other data. International regulations must support the spreading of e-commerce and the associated encryption techniques in order to establish a secure e-commerce environment that customers can trust and develop faith in international deployment of ecommerce so...

متن کامل

DecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds

With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the Cloud, share a large amount of data day by day. Secure Data sharing is an important issue over the cloud environment. In order to enhance the security services, the paper proposes Decentralized Cryptography Technique for Secure Communication over the Clouds. In this p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006