Object retrieval and access management in electronic commerce
暂无分享,去创建一个
Electronic commerce over the Internet is now tens of billions of dollars per year and growing. This article describes how objects used in EC can be located and protected from unauthorized access. It discusses the three kinds of EC: customer interactions with a business, business interactions with other businesses, and interactions within a business. It characterizes the object retrieval and access management required to support the types of EC. It describes how metadata expressed in XML can be used to locate objects for retrieval and how a public key infrastructure along with role-based access control can be used to implement the distributed authentication and access control necessary to support complex access policies. In addition, the article describes activities within the Information Technology Laboratory at the National Institute of Standards and Technology which contribute to the development of related standards and tests.
[1] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[2] Giles,et al. Searching the world wide Web , 1998, Science.
[3] William J. Majurski. Authentication Proxy for the VistA Hospital Information System , 1998 .
[4] Mary Brady,et al. VRML Test Case Generation and Evaluation Using Java , 1998 .
[5] Mark Skall,et al. Web-based conformance testing for VRML , 1997, STAN.