The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User behavior-based anomaly detection is currently one of the major concerns of system security research. For ecommerce, this paper proposes an online anomaly detection method, based on variable-length sequences of user behavior. The algorithm includes a training stage and a detection stage. In the training stage, we mainly use the variable-length sequences to represent the correlation between the...
The development of cyber society has fostered the emergence of e-commerce, which is active with business and private transactions. Nevertheless, it also emboldened malicious activities that damage users' profit in the society. Among these activities, Distributed Denial of Services (DDoS), which imposes an excessive workload on network entities such as hosts, is one of the most devastating form of...
When the precise risk probability or consequence is not known, as is the case with many online security risks, it is not clear how people judge and respond to such risks. In this research, we study the impact of e-commerce consumers' knowledge of online security risks on their risk evaluation and purchase intentions. Based on research in the decision theory field, we categorize a person's knowledge...
In a faceless business transaction such as in e-commerce, trust plays a major influence on a customer's decision making behavior. Trust on e-commerce is very much dependent on the information obtained from the vendors' websites. From our own personal experiences with e-commerce websites, it is not unusual to find some essential information missing. In this paper, we present to the readers our findings...
In peer-to-peer (P2P) e-commerce systems, the trust mechanisms already proposed always replaced commodity's reputation with peer's reputation, so some peers often try to keep a relatively high peer's trust value while making their profit of doing some dishonest transactions. So, presented CRBT model (commodity's reputation-based trust model)-a novel trust mechanism. By introducing commodity's short-term...
Today E-commerce popularity has made web an excellent source of gathering customer reviews / opinions about a product that they have purchased. The number of customer reviews that a product receives is growing at a very fast rate (It could be in hundreds or thousands). Opinion mining from product reviews, forum posts and blogs is an important research topic today with many applications. However, existing...
Leslie Lampor proposed the theory of Temporal Logic of Actions(TLA),which can express model program and logical rules in one language at the same time. Secure Electronic Transaction(SET) is an secure protocol for e-commerce, Based on the open network and paying with credit card. The agreement defines the whole process of the internet transactions. And it has a complete authentication. Based on the...
Comparing with traditional Web techniques, Web Service is a loose coupling to efficiently integrate the information cross-enterprise, cross-platform, and cross-language. It's also standards-based and platform neutral .These features make the Web Service technology ideal for system integration at the enterprise level, and for supporting Business-to-business integration and application-to-application...
Digital rights management allows content providers to control the distribution and usage of digital contents for their e-commerce applications. Most of previously proposed digital rights management mechanisms focus on the protection mechanisms for digital contents and pay less attention to the discussion on business models and users' convenience. It will decrease effective distribution for digital...
The continuous growth and development of ecommerce around the world is disproportionate to Asianconsumers' adoption of online shopping. The average adoption rate in Asian countries is low compared to that in western countries. The purpose of this paper is to provide an understanding of the current situation regarding online shopping behavior in Asian countries, especially Malaysia. The factors that...
E-commerce protocols are integral components of E-commerce systems. Verification of E-Commerce protocols'security level has become a hot spot in both information security and E-commerce researching area. Recent research focuses on E-commerce protocols' general properties such as secrecy and authentication, but always ignores particular properties related to commerce such as anonymity, fairness and...
During the procedure of provider selection in e-commercial environment, how to make decision on selecting providers to complete the next transaction reliably is an emergency. Establishing trust system is an alternative to respond the challenge. Based on the analysis of existing trust model and the fundamental trust requirements, a novel cosine trust computational model was proposed in this paper and...
In the last several years, E-commerce has developed rapidly in China as a convenient means of trade and business, which, however, faces challenges of security issues as well. This thesis covers the current situation of security problem of E-commerce in our country, a summary of the security threats confronted by E-commerce, and solutions from technical, legislative and personal consciousness aspects...
With the prosperity of E-commerce industry, the electronic commerce course construction also needs developing synchronously. E-commerce security is the important part of e-commerce, and is also a course which combines theory with practice closely. To improve the practical operative ability, a perfect teaching experiment platform is necessary for students to do the e-commerce security-related experiments...
With the widespread of Internet, e-commerce has become a major mode for business. And the key problem that restricts the development of e-commerce's development is the security problem. In terms of this problem, this paper makes an analysis on the security problems faced by the e-commerce and puts forward the security requirements on e-commerce. Finally, the paper also deals with the construction...
M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants PDA. Today many people never leave home without their mobile phones. As content delivery over wireless devices becomes faster and scalable, there is wide speculation that m-commerce will surpass wireline e-commerce. M-commerce, in...
The following topics are dealt with: data privacy, e-commerce; identity based broadcast encryption; security biometric password multiserver authentication scheme; e-payment system; remote password authentication scheme; relational database robust watermarking algorithm; security protocol; access control model and transactional data management.
The security of service-oriented applications is crucial in several contexts such as e-commerce or e-governance. The design, implementation, and deployment of this kind of services are often so complex that serious vulnerabilities remain even after extensive application of traditional validation techniques, such as testing. Given the importance of security-sensitive service applications, the development...
To meet the new requirements drove by nowadays E-commerce for the signature schemes, a new threshold signature scheme is proposed from bilinear pairings based on improved short signature scheme, which realizes a single signing member can accomplish signature efficiently. The analysis shows that the scheme serves properties of non-masquerading and auditing, the members can be added and revoked dynamically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.