A Security Framework for E-Business Applications

During the electronic business, the clients and the merchants make use of the internet. Thus, we can say that the internet, the client, and the merchant are the components for the electronic business. The Electronic Business involves various categories of businesses. These various types of e-businesses have different types of security requirements to keep the businesses secure. The threats to these types of businesses prohibit people from believing on them. Except highly educated, people often do not take much interest in believing much on the services provided by e-businesses because of the problems of security in doing these types of businesses. We are proposing here a framework that can be implemented on various categories of e-business so that it can be trusted by most of the people. The framework can be used to define the possibilities of threats for the various categories. Using these possibilities, it is possible to give a prediction of the level of security needed for these categories.

[1]  Birgit Pfitzmann,et al.  SEMPER - Secure Electronic Marketplace for Europe , 2000, Lecture Notes in Computer Science.

[2]  Munindar P. Singh The Practical Handbook of Internet Computing , 2004 .

[3]  N. Adam,et al.  Electronic Commerce: Current Research Issues and Applications , 1996 .

[4]  S. Bose,et al.  Implementing e-governance using oecd model (modified) and gartner model (modified) upon agriculture of Bangladesh , 2007, 2007 10th international conference on computer and information technology.

[5]  O. S. Saydjari Multilevel Security: Reprise , 2004, IEEE Secur. Priv..

[6]  Konstantin Knorr,et al.  Security of Electronic Business Applications - Structure and Quantification , 2000, EC-Web.

[7]  Joseph G. Tront,et al.  E-commerce security issues , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[8]  Vladimir Zwass,et al.  Electronic Commerce: Structures and Issues , 1996, Int. J. Electron. Commer..

[9]  Konstantin Knorr,et al.  Security Requirements of E-Business Processes , 2001, I3E.

[10]  A. Sengupta,et al.  e-Commerce security — A life cycle approach , 2005 .