CFP last date
20 May 2024
Reseach Article

A Security Measure for Electronic Business Applications

by Anuradha Sharma, Praveen Kumar Misra, Puneet Misra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 7
Year of Publication: 2014
Authors: Anuradha Sharma, Praveen Kumar Misra, Puneet Misra
10.5120/17826-8612

Anuradha Sharma, Praveen Kumar Misra, Puneet Misra . A Security Measure for Electronic Business Applications. International Journal of Computer Applications. 102, 7 ( September 2014), 12-16. DOI=10.5120/17826-8612

@article{ 10.5120/17826-8612,
author = { Anuradha Sharma, Praveen Kumar Misra, Puneet Misra },
title = { A Security Measure for Electronic Business Applications },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 7 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number7/17826-8612/ },
doi = { 10.5120/17826-8612 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:29.361199+05:30
%A Anuradha Sharma
%A Praveen Kumar Misra
%A Puneet Misra
%T A Security Measure for Electronic Business Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 7
%P 12-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the growth of business over the internet, there is more scope of security vulnerabilities over the internet. Despite of many efforts to make internet safe to the users, there is still a possibility for threats. The client, as well as the merchant for the electronic business, always faces problems due to these threats. This paper is an effort to distinguish the threats for the client perspective and the merchant perspective. Further a measure has been defined for securing both the parties over the internet during the electronic business. Further, the measure can be used for the analysis, design of an application, and also, to compare it with other applications.

References
  1. Anuradha Sharma, Puneet Mishra, "Security requirements for e-business applications", proceedings of TIMES-2013, Alwar, 2013.
  2. Atul kahate, "Cryptography and Network Security", TMH, New Delhi, 2006, pp. 4-10.
  3. A Sengupta, C. Mazumdar, M. S. Barik, "E-commerce Security-A Lifecycle Approach", Sadhana, vol. 30, Parts 2&3, April/June 2005, pp. 119-140.
  4. C. P. Pfleeger, S. L. Pfleeger, D. Shah, "Security in Computing", Pearson Prentice Hall, 2009, pp. 4-18.
  5. Matt Bishop, "Introduction to Computer Security", Pearson, 2011, pp. 4-10.
  6. Konstantin Knorr, Susanne Röhrig, "Security requirements of e-business processes", Volume 202 of IFIP Conference Proceedings, pages 73-86, Kluwer, 2001.
  7. Konstantin Knorr, Susanne Röhrig, "Security of Electronic Business Applications: Structure and Quantification", Proceedings of the first International Conference on Electronic Commerce and Web Technologies, pp 25-37, Springer-Verlag, London, 2000.
  8. William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security —Repelling the Wily Hacker. Professional Computing Series. Addison Wesley, 1994.
  9. Randy C. Marchany, Joseph G. Tront, "E-Commerce Security Issues", Proceedings of the 35th Hawaii International Conference on System Sciences – 2002.
  10. N. Smith, L. Ferreira, E. Mead, "E-Business Trends", Working Paper 2 of the E- Business and Transport Project for The National Transport Secretariat.
  11. Internet security systems, "Network and Host-Based Vulnerability Assessment", 1999, http:// www. iss. net.
  12. Hugh E. Williams, David Lane, "Web Database Applications with PHP and MySQL", 2004, O'Reilly.
  13. Anuradha Sharma, Puneet Misra, "E-Business Transaction Security: Changing Trends in Database Security- Critical Review", International Journal of Computer Engineering and Technology(IJCET), IAEME, Vol. 4, Issue 6, Nov-Dec(2013), pp. 175-180.
Index Terms

Computer Science
Information Sciences

Keywords

Electronic business security security measure.