CFP last date
20 May 2024
Reseach Article

Authentication Approaches for E-Commerce Transactions: An Overview

Published on February 2013 by Usha Nandwani, Sangita Chaudhari
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 4
February 2013
Authors: Usha Nandwani, Sangita Chaudhari
098e292c-82a1-41ec-823a-5082b0cf0cec

Usha Nandwani, Sangita Chaudhari . Authentication Approaches for E-Commerce Transactions: An Overview. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 4 (February 2013), 38-42.

@article{
author = { Usha Nandwani, Sangita Chaudhari },
title = { Authentication Approaches for E-Commerce Transactions: An Overview },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 4 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 38-42 },
numpages = 5,
url = { /proceedings/icrtitcs2012/number4/10274-1371/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Usha Nandwani
%A Sangita Chaudhari
%T Authentication Approaches for E-Commerce Transactions: An Overview
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 4
%P 38-42
%D 2013
%I International Journal of Computer Applications
Abstract

Mostly we use password for Remote Authentication but Smart Card- based scheme is very promising and practical solution to remote authentication. Over the past several years, Smart Cards have achieved a growing acceptance as a powerful tool for Security, Identification and Authorization. Smart Cards have been widely used as simple token hardware in authentication process. As the e-business is growing rapidly via the internet, many organizations are implementing all the infrastructures that allow them to have secure e-business transactions. In this paper we study what is e-business, threats for e-business, security requirements for e-business and various authentication approaches for e-commerce transactions that allow partners to realize secure transactions.

References
  1. Fourar-Laidi, H. , "A smart card based framework for securing e-business transactions in distributed systems. ", Journal of King Saud University – Computer and Information Sciences (2012), 2012. 05. 002, pp. 1-5.
  2. Sathiyamoorthy, E. , Narayana Iyenger, N. , Ramachandran, V. , "Agent based trust management framework in distributed e-business environment", International journal of computer science & information technology(IJCSIT), Vol. 2. , No. 1, February 2010. pp. 14-28.
  3. Theodosios, T. , George, S. , George, P. , "Considerations of Public Key Infrastructure (PKI), Functioning as a Chain of Trust in Electronic Payments Systems", International Journal of Information and Communication Engineering 2:5 2006, pp. 330-337
  4. Wang, C. , Yanli, F. , "Model Based Security Policy Assessment for E-Business Environment", Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT '09) Huangshan, P. R. China, 26-28, Dec. 2009, pp. 088-093
  5. Eben, O. , "A Systematic Approach to e-Business Security", University of New Brunswick, Fredericton, Canada. 2001,.
  6. Srinivasan, S. , "Role of trust in e-Business success," Information Management and Computer Security, Vol. 12, No. 1, 2004, pp. 66-72
  7. A Healthcare CFO's Guide To Smart Card Technology And Applications 2/09 "The Smart Card Alliance", card Logix Corporation," smart card & security basics"
  8. M. Henderson, R. Coulter, "Modelling Trust Structure for Public Key Infrastructure", ACISP 2002, Lecture Notes in Computer Science Col 2384, 2002, pp. 55-70
  9. S. Gritzalis, D. Gritzalis, "A Digital Seal solution for deploying Trust on Commercial Transactions", Information Management and Computer Security, Vol. 9, No. 2, 2001, pp. 71-79
  10. Rivest, R. et al. , "A method for obtaining digital signatures and public-key cryptosystems". 1978. Communication of the ACM 21 (2), 120–126.
Index Terms

Computer Science
Information Sciences

Keywords

Card Secure E-business Transaction Pki Integrity Authentication Internet Policy Based Repudiation Based