期刊文献+

威胁电子商务安全的因素及实施方案 被引量:2

Threat to the Safety Factors and the Implementation of E-Commerce Program
下载PDF
导出
摘要 安全问题是电子商务发展中最为突出的问题,主要分析了电子商务所面临的各种安全威胁,及产生这些威胁的各种因素,围绕电子商务的安全目标,给出了电子商务安全的实现技术及基于该技术的实施方案。 Security issues are the most prominent problem of the e-commerce development. The paper analyzed a variety of security threats faced by the e-commerce,and various factors that produced these threats,the implementation of e-commerce secrity technology and based on the technology implementation plan were given centered on e-commerce security objectives.
作者 吴洁
出处 《计算机安全》 2010年第2期70-72,共3页 Network & Computer Security
关键词 电子商务 数字签名 数字信封 双重签名 CA证书 e-commerce digital signature digital envelope dual digital CA certificate
  • 相关文献

参考文献3

  • 1企业在线2nt.NET,电子商务之路[EB/OL].http://www.intoner.cn/martsoft/network.guide.htmcopyright(c)2000-2003济南商务网走进互联网(济南)技术服务有限公司.
  • 2益安培训http://www.ean-info.com/Copyright(c)2003北京益安信息安全技术培训中心.
  • 3李新,吕建,曹春,冯新宇,陶先平.移动Agent系统的安全性研究[J].软件学报,2002,13(10):1991-2000. 被引量:23

二级参考文献17

  • 1Gray, R.S., Cybenko, G., Kotz, D., et al. D'Agents: security in a multiple -language, mobile-agent system. In: Vigna, G., ed. Mobile Agents and Security. L ecture Notes in Computer Science 1419, Berlin: Springer-Verlag, 1998. 154~187.
  • 2Chess, D., Harrison, C., Kershenbaum, A. Mobile agents: are they a good id ea? 1994. http://www.research.ibm.com/iagents/paps/ mobile_idea.pdf.
  • 3Wahbe, R., Lucco, S., Anderson, T.E., et al. Efficient software-based faul t isolation. ACM SIGOPS Operating Systems Review, 1993,27(5):203~216.
  • 4Farmer, W., Guttman, J., Swarup, V. Security for mobile agents: authentica tion and state appraisal. In: Bertino, E., ed. Proceedings of the Computer Secur ity--ESORICS'96. Lecture Notes in Computer Science 1146, 1996. 118~130.
  • 5Necula, G.C., Safe, P.L. Untrusted agents using proof-carrying code. In: V igna, G., ed. Mobile Agents and Security. Lecture Notes in Computer Science 1419 , Berlin: Springer-Verlag, 1998. 61~91.
  • 6Roth, V. Secure recording of itineraries through cooperating agents. 1998. http://cuiwww.unige.ch/~ecoopws/ws98/papers/ vroth98c.ps.
  • 7Freier, A.O., Karlton, P., Kocher, P.C. The SSL protocol. 1996. http://hom e.netscape.com/eng/ssl3/ssl-toc.html.
  • 8Czajkowski, G., von Eicken, T. JRes: a resource accounting interface for Java. ACM SIGPLAN Notices, 1998,33(10):21~35.
  • 9Chaum, D., Fiat, A., Naor, N. Untraceable electronic cash. In: Goldwasser , S., ed. Advances in Cryptology――CRYPTO'88. Lecture Notes in Computer Science 403, Berlin: Springer-Verlag, 1990. 319~327.
  • 10Medvinsky, G., Neuman, B.C. Netcash: a design for practical electronic cu rrency on the internet. In: ACM SIGSAC. 1993. 102~106.

共引文献22

同被引文献8

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部