Conceptualizing and Implementing an Information Security Strategy for Internet Billing Systems

نویسندگان

  • Panagiota Papadopoulou
  • Nicholas Kolokotronis
  • Panagiotis Kanellis
  • Drakoulis Martakos
چکیده

The decentralized nature of Internet billing systems demands a careful evaluation of the pantheon of security issues in order to avoid the potential occurrence of business risks that could not be easily mitigated. Understanding that Internet security is not merely a local technology issue implemented at each one of the endpoints of the interorganizational application, this paper presents an integrated approach based on a rigorous multi–level and multi– dimensional framework. Through synthesis, the framework evaluates and uses the available tools and techniques in a consistent manner, aiming to aid the implementation of the most effective security strategy possible. Its use and applicability is demonstrated over ‘Billing Mall’ – an Internet billing system currently being developed for the Hellenic Telecommunications Organization (OTE). Keywords—Network security, cryptography, information security strategy, Internet billing systems, electronic com-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Feasibility of Implementing Blockchain and Internet of Things Technologies in Hospitals Affiliated to Tabriz University of Medical Sciences

Objective Considering the importance of implementing Internet of Thing (IoT) and blockchain technologies in the health sector, and the need to assess the feasibility of each project before implementation, this study aims to assess feasibility of implementing blockchain and IoT technologies in hospitals affiliated to Tabriz University of Medical Sciences. Methods This cross-sectional study was ...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

Web-based Medical Information Systems

Corporations and academia are currently exploring medical Information Systems. Medical information systems that contain information on the patients’ health records, appointments, laboratory tests/results, billing and insurance in one comprehensive web site are almost nonexistent. Some of the reasons for this include privacy concerns and reluctance to invest in new technology by health-care prov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000