Secure E-commerce Protection Profile
نویسندگان
چکیده
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared in accordance with the Common Criteria (CC), Version 2.1, as specified by the ISO 15408 standard. The SEPP states the requirements that sessions must satisfy in order to respond to the needs of e-commerce. The Target of Evaluation (TOE) security environment, which is composed of threat agents, vulnerabilities, attacks and threats, is described in detail. It is followed by describing the administrative security policies that are necessary to safeguard the TOE or its operating environment. The risks to the TOE are identified. The security objectives for the TOE are stated.
منابع مشابه
Mobile Payment Protocol 3D by Using Cloud Messaging
The popularity of mobile platforms makes them a good candidate for electronic payment. However, there are challenges in this field such as privacy protection, security, the bandwidth limitations of mobile networks, and the limited capabilities of mobile devices. Traditional e-commerce payment protocols were designed to keep track of traditional flows of data, are vulnerable to attacks and are n...
متن کاملTowards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property
The advent of the Web, electronic commerce and the creation of electronic distribution channels for content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising method is th...
متن کاملPrivacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation
With the evolution of the Internet, collaborative filtering techniques are becoming increasingly popular in E-commerce recommender systems. Such techniques recommend items to users employing similar users' preference data. People use recommender systems to cope with information overload. Although collaborative filtering systems are widely used by E-commerce sites, they fail to protect users' pr...
متن کاملA Review: Digital Rights Management Sustainable Development in e-Commerce
Strong encryption is an urgent need for e-commerce development, since it allows the privacy and secure transactions of the financial and other data. International regulations must support the spreading of e-commerce and the associated encryption techniques in order to establish a secure e-commerce environment that customers can trust and develop faith in international deployment of ecommerce so...
متن کاملDecenCrypto Cloud: Decentralized Cryptography Technique for Secure Communication over the Clouds
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the Cloud, share a large amount of data day by day. Secure Data sharing is an important issue over the cloud environment. In order to enhance the security services, the paper proposes Decentralized Cryptography Technique for Secure Communication over the Clouds. In this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006