Traditional access control a.k.a. authorisation for e-commerce systems is not flexible and efficient enough to combat the new emerging security challenges and public remains concerned about the security of online transactions as can be seen from http://www.security-survey.gov.uk. Challenges like changes in consumer's behaviour, advances in broadband technology, industrial maturity and entropy converging to usher in a new era of e-commerce security. The authors' proposed framework provides trust transformation rules which have associated conditions for authorisations to control access. The introduction of trust method formalises the conditions within logical perspective. The authors aim to build the architecture and trust model for trust and authorisation within an e-commerce service system. The architecture will help to build a secure e-commerce service system. The underlying framework will not only inform researchers of a better design for secure e-commerce service, but also assist e-commerce systems developers in the understanding of intricate constructions within trust and authorisation. This includes protecting transactions records of customers in terms of information privacy and access. The authors also propose rigorous logical foundation for trust and authorisation in e-commerce service environments based on ABLP. He has authored five books, including Parallel Database Systems, Principle of Database Systems, and Digital Library, and published more than 240 technical papers.Fred Mtenzi is a Lecturer at the School of Computing, Dublin Institute of Technology, Ireland. Prior to joining DIT, he worked as a Lecturer at the University of Dar es salaam in Tanzania. His research interest includes design of algorithms for solving combinatorial optimisation problems, energy aware routing in mobile ad hoc networks and its related security issues, cybercrime, pervasive computing and knowledge management. He has organised and chaired a number of international conferences. He has been a Guest Editor in a number of journal special issues. He is a member of the IEEE, ACM, and ISSA. Example 1: We trust that private keys remain indeed private so that messages signed with J K carry the authority of J: J K J ⇒ Thus, if any statement s is ever signed with Js private key: J s K says By rule, Speaks for: ( ) ( ) J J s s K J K says J says ⇒ ⊃ ⊃