32,757 research outputs found

    Improving the Authentication Mechanism of Business to Consumer (B2C) Platform in a Cloud Computing Environment: Preliminary Findings

    Get PDF
    The reliance of e-commerce infrastructure on cloud computing environment has undoubtedly increased the security challenges in web-based e-commerce portals. This has necessitated the need for a built-in security feature, essentially to improve the authentication mechanism, during the execution of its dependent transactions. Comparative analysis of the existing works and studies on XML-based authentication and non-XML signaturebased security mechanisms for authentication in Business to Consumer (B2C) e-commerce showed the advantage of using XML-based authentication, and its inherent weaknesses and limitations. It is against this background that this study, based on review and meta-analysis of previous works, proposes an improved XML digital signature with RSA algorithm, as a novel algorithmic framework that improves the authentication strength of XML digital signature in the B2C e-commerce in a cloud-based environment. Our future works include testing and validation, and simulation, of the proposed authentication framework in Cisco’s XML Management Interface with inbuilt feature of NETCONF. The evaluation will be done in conformity to international standard and guideline –such as W3C and NIST

    Research on Authentication Technology of E-Commerce

    Get PDF
    With the continuous development of society and the requirements of economic integration, E-commerce is becoming a major economic model in the market , But it is facing a huge security problem in the course of its development。 In this paper it is starting from overview on e-commerce and problems to be solved on development of e-commerce :authentication is a technology of the most basic to ensure the e-commerce transactions, Then it is discoursed the development of e-commerce authentication technology, It is a digital certificate, And center of the digital certificate is a CA technology , Main technical departments and their function for CA technology is PAA,RA,CP and PKI, Third it is discoursed main basis technology of the CA system technology,Including digital envelope and digital signature and dual digital signature , Detailed analysis their working principle ,In the end I analyze direction for future research of e-commerce authentication technology: The dynamic password of the mobile phone software is most likely to be one of the large-scale popularization of the next generation of internet authentication technology

    Agent fabrication and its implementation for agent-based electronic commerce

    Get PDF
    In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications

    Migration control for mobile agents based on passport and visa

    Get PDF
    Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-commerce framework. P/V not only serves as up-to-date digital credentials for agent-host authentication, but also provides effective security mechanisms for online communities to control mobile agent migration. Protection for mobile agents, network hosts, and online communities is enhanced using P/V. We discuss the design issues in details and evaluate the implementation of the proposed system

    Designing a Virtual Center for E-Commerce

    Get PDF
    In the actual context of developing digital services, the promotion of a system that manages multiple e-commerce sites can be extremely valuable in increasing the economic effects for the companies. This paper presents the current stage of the experimental system design and implementation, an open system website-based (called Single Way for E-Commerce - SWEC) having the goal to collaborate with many database servers of the companies that offer e-commerce sevices and also to interract with electronic payment and e-administration systems. This new approach allows the clients, after them authentication, to navigate on e-commerce websites and search different products, grouping on domains, companies and geographic areas. SWEC System will offer to the customer the opportunity to visualize and compare similar products, to order and receive a single invoice for all the products he wants to buy.E-Commerce, Database-driven site, Open system, Server Side Programming

    Designing a Virtual Center for E-Commerce

    Get PDF
    In the actual context of developing digital services, the promotion of a system that manages multiple e-commerce sites can be extremely valuable in increasing the economic effects for the companies. This paper presents the current stage of the experimental system design and implementation, an open system website-based (called Single Way for E-Commerce - SWEC) having the goal to collaborate with many database servers of the companies that offer e-commerce sevices and also to interract with electronic payment and e-administration systems. This new approach allows the clients, after them authentication, to navigate on e-commerce websites and search different products, grouping on domains, companies and geographic areas. SWEC System will offer to the customer the opportunity to visualize and compare similar products, to order and receive a single invoice for all the products he wants to buy.E-Commerce, Database-driven site, Open system, Server Side Programming

    PKI and Its Applications in E-Commerce in China

    Get PDF
    PKI system supports user authentication, message transmission, data integrity, message storage confidentiality, and the non-repudiation of operation. PKI can completely address e-commerce security requirements and PKI technology has been applied successfully in e-commerce as well. This article studies the system compositions of e-commerce, briefly analyzes e-commerce’s applications in various countries, and highlights PKI and its applications in e-commerce in China. Keywords: Public Key Infrastructure; E-commerce; applicatio

    Investigating customer-facing security features on South African e-commerce websites

    Get PDF
    E-commerce websites often store sensitive customer information and there is the impression that customers are not as concerned about protecting their data as they should be. Instead they often choose convenience over security. There are those who argue that e-vendors do not provide the necessary environment to adequately protect their customers’ data by utilizing multi-factor authentication and by providing customer support that educates and encourages customers to follow security best practices. This study develops criteria to evaluate website security and goes on to investigate how the top 20 South African e-commerce websites perform against this. The results show that multi-factor authentication is underutilized and security in the form of password-based authentication can be improved. Furthermore, despite many customer support channels and resources, there is little emphasis placed on educating and encouraging customers to follow security best practices. The results suggest areas for security improvement in order to build trust in e-commerce websites.</p
    corecore