期刊文献+

一种基于电子商务的全面防御安全模型研究 被引量:2

Study on comprehensive security model based on e-commerce
下载PDF
导出
摘要 电子商务的涌现标志着商贸活动正从传统方式向电子信息化方向变革。电子商务带给人们便捷、高效和低成本的同时,却面临着比其他网络应用更为严重的安全威胁和挑战。只有解决其安全性问题,电子商务才能继续健康发展。分析了电子商务所面临的安全问题,提出了"全面防御"理念,并建立了相应的安全模型。该模型的反聩机制能根据应用中发现的问题不断完善,从而帮助该模型自适应地提高电子商务的安全性。该模型符合"不仅要从技术层面采取相关的措施,更重要的是从社会、人员及应用环境等层面着手"的思想。 The emergence of e-commerce trade activities marks the change of business activity from the traditional way to electronic information. It brings people convenience, high efficiency and low cost, while being faced with more intense security threats and challenges than other network application. Only when the security problems of e-commerce are solved can it continue to develop healthily. The e-commerce security issues are analyzed in this paper and a "comprehensive defense" concept is proposed. The corresponding security model based on the idea is established. The feedback mechanism of the model can improve continuously according to the problems occurring in the application and help the model self-adaptively improve the security of e-commerce. The model is consistent with the idea that "take relevant measures not only from a technical level, more importantly, from a society, personnel and the application environmental to proceed".
作者 张铁楠
出处 《计算机时代》 2014年第11期4-6,共3页 Computer Era
关键词 电子商务 安全模型 全面防御 自适应 e-commerce defense security model comprehensive self-adaptive
  • 相关文献

参考文献4

二级参考文献19

  • 1郭红宾,梁晓诚,寇嘉梁.P2P系统信誉度模型的设计[J].微计算机信息,2008,24(9):276-277. 被引量:5
  • 2卿斯汉.一种电子商务协议形式化分析方法[J].软件学报,2005,16(10):1757-1765. 被引量:23
  • 3唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 4Lowe G.Breaking and fixing the Needham-Schroeder public-key protocol using FDR[C] ∥Itshape Proceedings of TACAS.LNCS 1055.Springer-Verlag,1996:147-166.
  • 5Heintze N,Tygar J,Wing J,et al.Model Checking Electronic Commerce Protocols[C] ∥Proceedings of the 2nd USENIX Workshop in Electronic Commerce.November 1996:146-164.
  • 6Ouyang C,Billington J.An improved formal specification of the Internet Open Trading Protocol[C] ∥Proceedings of the 2004 ACM Symposium on Applied Computing.Nicosia,Cyprus,2004:779-783.
  • 7Díaz G,Cuartero F,Ruiz V V,et al.Automatic verification of the TLS handshake protocol[C] ∥SAC.2004:789-794.
  • 8Kailar R.Accountability in electronic commerce protocols[J].IEEE Transaction on Software Engineering,1996,22(5):313-328.
  • 9Kremer S.Formal Analysis of Optimistic Fair Exchange Protocols[D].Universit'e Libre de Bruxelles Facult'e des Sciences,2003-2004.
  • 10Ray I,Ray I,Natarajan N.An anonymous and failure resilient fair-exchange ecommerce protocol[J].Decision Support Systems,2005,39:267-292.

共引文献7

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部