期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A Privilege Separation Method for Security Commercial Transactions 被引量:1
1
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
下载PDF
Security Online Transaction Risk and Prevention
2
《China's Foreign Trade》 2001年第10期38-42,共5页
关键词 CSRC security Online transaction Risk and Prevention high STAR THAN
下载PDF
Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus
3
作者 Tehreem Aslam Ayesha Maqbool +4 位作者 Maham Akhtar Alina Mirza Muhammad Anees Khan Wazir Zada Khan Shadab Alam 《Computers, Materials & Continua》 SCIE EI 2022年第1期1089-1109,共21页
Enterprise Resource Planning(ERP)software is extensively used for the management of business processes.ERP offers a system of integrated applications with a shared central database.Storing all business-critical inform... Enterprise Resource Planning(ERP)software is extensively used for the management of business processes.ERP offers a system of integrated applications with a shared central database.Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure,which makes the database vulnerable.This paper investigates database and Blockchain integration,where the Blockchain network works in synchronization with the database system,and offers a mechanism to validate the transactions and ensure data integrity.Limited research exists on Blockchain-based solutions for the single point of failure in ERP.We established in our study that for concurrent access control andmonitoring of ERP,private permissioned Blockchain using Proof of Elapsed Time consensus is more suitable.The study also investigated the bottleneck issue of transaction processing rates(TPR)of Blockchain consensus,specifically ERP’s TPR.The paper presents systemarchitecture that integrates Blockchain with an ERP system using an application interface. 展开更多
关键词 transaction security enterprise systems blockchain transaction integrity hyperledger sawtooth PoET consensus
下载PDF
Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment
4
作者 D.Prabakaran Shyamala Ramachandran 《Computers, Materials & Continua》 SCIE EI 2022年第1期1781-1798,共18页
The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network(VPN)backbone.This prominent application of... The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network(VPN)backbone.This prominent application of VPN evades the hurdles involved in physical money exchange.The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server.The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014,Capital One Data Breach in 2019,and manymore cloud server attacks over and over again.These attacks necessitate the demand for a strong framework for authentication to secure from any class of threat.This research paper,propose a framework with a base of EllipticalCurve Cryptography(ECC)to performsecure financial transactions throughVirtual PrivateNetwork(VPN)by implementing strongMulti-Factor Authentication(MFA)using authentication credentials and biometric identity.The research results prove that the proposed model is to be an ideal scheme for real-time implementation.The security analysis reports that the proposed model exhibits high level of security with a minimal response time of 12 s on an average of 1000 users. 展开更多
关键词 Cloud computing elliptical curve cryptography multi-factor authentication mel frequency cepstral coefficient privacy protection secured framework secure financial transactions
下载PDF
Impact of International Networks on Standardization Process in Banking Industry: Example of Secure Electronic Transaction (SET) Initiative
5
作者 Paul Marc Collin Hana Machkova 《Journal of Modern Accounting and Auditing》 2013年第11期1469-1482,共14页
The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability sol... The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers. 展开更多
关键词 cyber payments bank cards deterritorialization financial markets secure electronic transaction (SET)specification
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部