메뉴 건너뛰기




Volumn 4, Issue 2, 2000, Pages 36-44

E-commerce trust metrics and models

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTATIONAL LINGUISTICS; FUZZY SETS; INTERNET; MATHEMATICAL MODELS; MATRIX ALGEBRA; NETWORK PROTOCOLS; RISK ASSESSMENT;

EID: 0033893895     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/4236.832944     Document Type: Article
Times cited : (158)

References (9)
  • 2
    • 0004035649 scopus 로고    scopus 로고
    • Internet Engineering Task Force RFC 2246 (standards track), Jan.
    • T. Dierks and C. Allen, "The TLS Protocol Version 1.0," Internet Engineering Task Force RFC 2246 (standards track), Jan. 1999; available at ftp://ftp.isi.edu/in-notes/rfc2246.txt.
    • (1999) The TLS Protocol Version 1.0
    • Dierks, T.1    Allen, C.2
  • 3
    • 0343974572 scopus 로고    scopus 로고
    • Secure electronic transaction specification
    • May
    • Secure Electronic Transaction Specification, Book 3: Formal Protocol Definition, Version 1.0, May 1997; available at http://www.setco.org/download/set_bk3.pdf; general information on SET is available at http://www.mastercard. com/set.
    • (1997) Book 3: Formal Protocol Definition, Version 1.0
  • 4
    • 0342668557 scopus 로고    scopus 로고
    • IETF RFC 2706 (informational), Oct. general information on ECML specifications is available at http://www.ecml.org/spec.html
    • D. Eastlake and T. Goldstein, "ECML, v1: Field Names for E-Commerce," IETF RFC 2706 (informational), Oct. 1999; available at http://www.ietf.org/rfc/rfc2706.txt; general information on ECML specifications is available at http://www.ecml.org/spec.html.
    • (1999) ECML, v1: Field Names for E-Commerce
    • Eastlake, D.1    Goldstein, T.2
  • 5
    • 0030671980 scopus 로고    scopus 로고
    • Toward acceptable metrics of authentication
    • IEEE Computer Soc. Press, Los Alamitos, Calif., May
    • M.K. Reiter and S.G. Stubblebine, "Toward Acceptable Metrics of Authentication," Proc. IEEE Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., May 1997, pp. 10-20.
    • (1997) Proc. IEEE Symp. Security and Privacy , pp. 10-20
    • Reiter, M.K.1    Stubblebine, S.G.2
  • 6
    • 0027316628 scopus 로고
    • Proxy-based authorization and accounting for distributed systems
    • IEEE Computer Soc. Press, Los Alamitos, Calif., May
    • B.C. Neumann, "Proxy-Based Authorization and Accounting for Distributed Systems," Proc. 13th Int'l Conf. Distributed Computing Systems (ICDCS 93), IEEE Computer Soc. Press, Los Alamitos, Calif., May 1993, pp. 283-291.
    • (1993) Proc. 13th Int'l Conf. Distributed Computing Systems (ICDCS 93) , pp. 283-291
    • Neumann, B.C.1
  • 7
    • 49349133217 scopus 로고
    • Fuzzy sets as a basis for a theory of possibility
    • L. Zadeh, "Fuzzy Sets as a Basis for a Theory of Possibility," Fuzzy Sets and Systems, Vol. 1, 1978, pp. 3-28.
    • (1978) Fuzzy Sets and Systems , vol.1 , pp. 3-28
    • Zadeh, L.1
  • 8
    • 0030704066 scopus 로고    scopus 로고
    • Buildingtrust for distributed commerce transactions
    • IEEE Computer Soc. Press, Los Alamitos, Calif, May
    • J. Su and D. Manchala, "BuildingTrust for Distributed Commerce Transactions," Proc. 17th Int'l Conf. Distributed Computing Systems (ICDCS 97), IEEE Computer Soc. Press, Los Alamitos, Calif, May 1997, pp. 322-329.
    • (1997) Proc. 17th Int'l Conf. Distributed Computing Systems (ICDCS 97) , pp. 322-329
    • Su, J.1    Manchala, D.2
  • 9
    • 0029720084 scopus 로고    scopus 로고
    • Makingtrust explicit in distributed commerce transactions
    • IEEE Computer Soc. Press, Los Alamitos, Calif., May
    • S. Ketchpel and H.M. Garcia, "MakingTrust Explicit in Distributed Commerce Transactions," Proc. 16th Int'l Conf. Distributed Computing Systems (ICDCS 96), IEEE Computer Soc. Press, Los Alamitos, Calif., May 1996, pp. 270-281.
    • (1996) Proc. 16th Int'l Conf. Distributed Computing Systems (ICDCS 96) , pp. 270-281
    • Ketchpel, S.1    Garcia, H.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.