期刊文献+

安全电子商务的实现技术研究 被引量:1

A Study on the Technology and Solution for E.Commerce Security Associate Professor
原文传递
导出
摘要 保证信息传输的机密性、完整性、认证性、不可抵赖性、不可拒绝性和访问控制性是成功开展电子商务的前提。本文主要分析了电子商务所面临的各种安全威胁,及威胁产生的根源和因素,围绕电子商务的安全目标,给出了安伞电了商务的实现技术及基于该技术的实施方案。 It is essential for the success of Electronic Commerce to ensure the confidentiality, integrity, authentication, non-repudiation, non-deniability and visiting control in the process of information transmission. These are also the technology preconditions and basis for E-commerce. This paper firstly gives an analysis on the main security challenges facing E-business today and their causes, and then puts forward a technological framework that can accomplish the security goal for E-Commerce. and provides a feasible solution for E-commerce security basing on the technology.
作者 蒋丽
出处 《网络安全技术与应用》 2011年第4期66-69,72,共5页 Network Security Technology & Application
关键词 电子商务 数字签名 数字信封 双重签名 CA证书 Electronic Commerce Digital Signature Digital Envelope Double Signature CA Certificate
  • 相关文献

参考文献5

  • 1益安培训.http://www.ean-info.com/Copyright 2003.北京益安信息安全技术培训中心.
  • 2CAeTrust整体安全管理解决方案http://www.yesky.corn/Enterprise/218714852997201920/20041201/1882499.shtml.
  • 3海丽,王丽丽,永刚.浅析双重签名的工作原理[J].计算机光盘软件与应用,2010(14):84-84. 被引量:1
  • 4李新,吕建,曹春,冯新宇,陶先平.移动Agent系统的安全性研究[J].软件学报,2002,13(10):1991-2000. 被引量:23
  • 5企业在线2nt.NET.电子商务之路[EB/OL].htlp://www.intonet.cn/martsoft/guide/ecway/part3-5.htmCopyright 2000-2003.

二级参考文献17

  • 1Gray, R.S., Cybenko, G., Kotz, D., et al. D'Agents: security in a multiple -language, mobile-agent system. In: Vigna, G., ed. Mobile Agents and Security. L ecture Notes in Computer Science 1419, Berlin: Springer-Verlag, 1998. 154~187.
  • 2Chess, D., Harrison, C., Kershenbaum, A. Mobile agents: are they a good id ea? 1994. http://www.research.ibm.com/iagents/paps/ mobile_idea.pdf.
  • 3Wahbe, R., Lucco, S., Anderson, T.E., et al. Efficient software-based faul t isolation. ACM SIGOPS Operating Systems Review, 1993,27(5):203~216.
  • 4Farmer, W., Guttman, J., Swarup, V. Security for mobile agents: authentica tion and state appraisal. In: Bertino, E., ed. Proceedings of the Computer Secur ity--ESORICS'96. Lecture Notes in Computer Science 1146, 1996. 118~130.
  • 5Necula, G.C., Safe, P.L. Untrusted agents using proof-carrying code. In: V igna, G., ed. Mobile Agents and Security. Lecture Notes in Computer Science 1419 , Berlin: Springer-Verlag, 1998. 61~91.
  • 6Roth, V. Secure recording of itineraries through cooperating agents. 1998. http://cuiwww.unige.ch/~ecoopws/ws98/papers/ vroth98c.ps.
  • 7Freier, A.O., Karlton, P., Kocher, P.C. The SSL protocol. 1996. http://hom e.netscape.com/eng/ssl3/ssl-toc.html.
  • 8Czajkowski, G., von Eicken, T. JRes: a resource accounting interface for Java. ACM SIGPLAN Notices, 1998,33(10):21~35.
  • 9Chaum, D., Fiat, A., Naor, N. Untraceable electronic cash. In: Goldwasser , S., ed. Advances in Cryptology――CRYPTO'88. Lecture Notes in Computer Science 403, Berlin: Springer-Verlag, 1990. 319~327.
  • 10Medvinsky, G., Neuman, B.C. Netcash: a design for practical electronic cu rrency on the internet. In: ACM SIGSAC. 1993. 102~106.

共引文献22

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部