期刊文献+

C2C交易信任管理机制探讨 被引量:15

A Study of Trust Management in C2C Commerce
下载PDF
导出
摘要 以一般典型的 C2 C交易类型——拍卖网站为例 ,通过分析其交易风险和安全需求 ,提出一个综合的电子商务信任管理模型 ,并通过实例加以说明 。 This paper works out a comprehensive trust management model for C2C commerce,based on risk analysis,security requirement analysis and common practice prevailing in typical C2C auction websites,aiming at providing a integral way of solving online trust management in C2C commerce.
作者 王丁 杨德华
机构地区 同济大学
出处 《电脑开发与应用》 2004年第3期38-39,41,共3页 Computer Development & Applications
关键词 电子商务 商品交易 信任管理机制 C2C交易 INTERNET ECommerce,C2C commerce,trust management,trust management model
  • 相关文献

参考文献3

  • 1徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 2Efraim Turban.Jae Lee.Electrionic Commerce:A Managerial Perspective.北京:高等教育出版社,2001:1-33.
  • 3Sonja Grabner- Kr, Eald A Kaluscha.Empirical research in on- line trust: a review and critical assessment Int. J Hu man - Computer Studies, 2003 (58) :783-812.

二级参考文献20

  • 1Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 2Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 3Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 4Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 5Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 6Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 7Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
  • 8Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.
  • 9Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139.
  • 10Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1~16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf.

共引文献112

同被引文献53

引证文献15

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部