期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
浅谈计算机安全与电子商务 被引量:2
1
作者 焦洋 刘晓玢 《电子技术与软件工程》 2013年第21期231-231,共1页
本文通过分析电子商务目前的安全现状;研究了几个在电子商务中比较常见的信息安全问题;根据问题提出了相应的解决建议;对电子商务中的计算机安全研究有一定的参考价值。
关键词 计算机安全 电子商务问 题和建议
下载PDF
中间件在电子支付中的应用 被引量:1
2
作者 骆科东 王建民 孙家广 《计算机工程》 CAS CSCD 北大核心 2002年第z1期240-243,共4页
提出一个应用于电子支付框架中的中间件结构,分析了它的安全性、方便性和灵活性,并与非中间件电子支付方式进行比较,分析采用中间件的好处。最后论述了这个中间件结构中的一些关键技术。
关键词 电子支付:中件:电子商务
下载PDF
On the E-Valuation of Certain E-Business Strategies on Firm Performance by Adaptive Algorithmic Modeling: An Alternative Strategic Managerial Approach
3
作者 Alexandra Lipitakis Evangelia A.E.C. Lipitakis 《Computer Technology and Application》 2012年第1期38-46,共9页
This paper describes an innovative adaptive algorithmic modeling approach, for solving a wide class of e-business and strategic management problems under uncertainty conditions. The proposed methodology is based on ba... This paper describes an innovative adaptive algorithmic modeling approach, for solving a wide class of e-business and strategic management problems under uncertainty conditions. The proposed methodology is based on basic ideas and concepts of four key-field interrelated sciences, i.e., computing science, applied mathematics, management sciences and economic sciences. Furthermore, the fundamental scientific concepts of adaptability and uncertainty are shown to play a critical role of major importance for a (near) optimum solution of a class of complex e-business/services and strategic management problems. Two characteristic case studies, namely measuring e-business performance under certain environmental pressures and organizational constraints and describing the relationships between technology, innovation and firm performance, are considered as effective applications of the proposed adaptive algorithmic modeling approach. A theoretical time-dependent model for the evaluation of firm e-business performances is also proposed. 展开更多
关键词 Adaptive algorithms algorithmic modeling e-business problems e-service strategy management methodologies hybrid algorithmic modeling strategy management (SM) methodologies time-dependent performance evaluation model.
下载PDF
E-commerce security policy analysis
4
作者 Maarina 《International Journal of Technology Management》 2014年第11期46-47,共2页
In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed... In today' s 21st century of IT, e-commerce began to develop rapidly. Among them, in the process of e-commerce implementation, it is mainly to ensure system security issues. Based primarily on this issue, we discussed issues related to certification systems, SSL protocol as well as SET protocol. In addition, the article also describes the business several other safety-related technology. 展开更多
关键词 e-commerce security authentication system SSLX agreement SET protocol
下载PDF
PBRRI: A Hybrid Peer-to-Peer Communication Model in Distributed Systems
5
作者 张亚英 尤晋元 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期128-132,共5页
In distributed systems independent agents need to interact with each other to accomplish their task. Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them coope... In distributed systems independent agents need to interact with each other to accomplish their task. Modern peer-to-peer computing technologies always concern with enabling interaction among agents and help them cooperate with each other. But in fact, access control should also be considered to limit interaction to make it harmless. This paper proposed a proxy based rule regulated interaction (PBRRI) model. Role based access control is introduced for security concerns. Regulation rules are enforced in a distributed manner so that PBRRI can be applied to the open distributed systems such as Internet. 展开更多
关键词 PEER-TO-PEER interaction rules regulation GROUP role based access control
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部