2000
DOI: 10.17705/1cais.00411
|View full text |Cite
|
Sign up to set email alerts
|

Web Security for E-Commerce

Abstract: This tutorial presents an overview of the major categories of Web site attacks, their effects, and possible countermeasures. The focus is the Web security necessary for a reasonable guarantee of secure e-commerce. The tutorial is intended for those who have little or no knowledge of Web security and its importance to e-commerce. It provides a basic understanding of the issues, the techniques, and the nomenclature used. An annotated bibliography points the reader to additional sources on specific topics.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2003
2003
2017
2017

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…Digitally signed e-mail makes use of asymmetric key cryptography such as RSA and allows one to clearly distinguish the identity of sender. The ideology behind the scheme is that each user owns a pair of public key and private key [Boncella 2000]. Only the genuine user can sign a message with his/her own private key while the receiver can validate the originality of the message by using a relevant public key that is readily available to the public from a trustable third party.…”
Section: Digitally Signed E-mailmentioning
confidence: 99%
“…Digitally signed e-mail makes use of asymmetric key cryptography such as RSA and allows one to clearly distinguish the identity of sender. The ideology behind the scheme is that each user owns a pair of public key and private key [Boncella 2000]. Only the genuine user can sign a message with his/her own private key while the receiver can validate the originality of the message by using a relevant public key that is readily available to the public from a trustable third party.…”
Section: Digitally Signed E-mailmentioning
confidence: 99%
“…An example would be a web browser using the HTTP protocol to request a web page from a web server. The details of this paradigm can be found in [Boncella 2000]. This concept is used to implement the service oriented architecture (SOA) which implements web services.…”
Section: Web Services Architecturementioning
confidence: 99%
“…Currently SSL (Secure Sockets Layer), PKI (Public Key Infrastructure), and firewalls are able to meet these requirements for conventional web traffic using HTTP [Boncella, 2000 andBoncella, 2003]. However SSL and firewalls are inadequate to assure these requirements for web services.…”
Section: Information Security Requirementsmentioning
confidence: 99%
See 1 more Smart Citation
“…The first of the concerns can be managed through the usual computer and network security methods [Boncella 2000, Boncella 2002].…”
Section: Information Securitymentioning
confidence: 99%