메뉴 건너뛰기




Volumn 10, Issue 4, 2002, Pages 149-158

A framework for analyzing e-commerce security

Author keywords

Computer security; Information technology; Internet

Indexed keywords

COMPUTER SOFTWARE; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; CRYPTOGRAPHY; DATA PRIVACY; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION TECHNOLOGY; INTERNET; NETWORK PROTOCOLS; QUALITY OF SERVICE;

EID: 0036040733     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220210436930     Document Type: Article
Times cited : (39)

References (19)
  • 1
    • 0005327111 scopus 로고    scopus 로고
    • The Java secure socket extension-authenticating and encrypting connections
    • February
    • Angel, K. (2001), “The Java secure socket extension-authenticating and encrypting connections”, Dr Dobb's Journal, February, pp. 21-8.
    • (2001) Dr Dobb's Journal , pp. 21-28
    • Angel, K.1
  • 2
    • 4243632680 scopus 로고    scopus 로고
    • Deploying enterprise-wide virus protection
    • available at:
    • Applied Technologies Group (1997), “Deploying enterprise-wide virus protection”, available at: www.techguide.com
    • (1997)
  • 5
    • 0005284367 scopus 로고    scopus 로고
    • NID introduction
    • available at:
    • CIAC (2001), “NID introduction”, available at: http://ciac.llnl.gov/cstc/nid/intro.html
    • (2001)
  • 9
    • 0005288975 scopus 로고    scopus 로고
    • AES and beyond – the IETF and strong crypto
    • available at:
    • Leech, M. (2000), “AES and beyond – the IETF and strong crypto”, available at: www. nortelnetworks.com
    • (2000)
    • Leech, M.1
  • 11
    • 0005363536 scopus 로고    scopus 로고
    • Microsoft SQL server security
    • available at: msdn.microsoft.com
    • Microsoft (2002), “Microsoft SQL server security”, available at: msdn.microsoft.com
    • (2002)
  • 14
    • 24444442416 scopus 로고    scopus 로고
    • Oracle 9i database security for e-business
    • available at:
    • Oracle (2001), “Oracle 9i database security for e-business”, available at: www.oracle.com
    • (2001)
  • 15
    • 0004286931 scopus 로고    scopus 로고
    • Prentice-Hall, Englewood Cliffs, NJ
    • Pistoia, M. et al. (1999), Java 2 Network Security, Prentice-Hall, Englewood Cliffs, NJ.
    • (1999) Java 2 Network Security
    • Pistoia, M.1
  • 16
    • 0005284548 scopus 로고    scopus 로고
    • Java security evolution and concepts
    • available at: java.sun.com
    • Raghavan, S. (2001), “Java security evolution and concepts”, Java Developer Connection, available at: java.sun.com
    • (2001) Java Developer Connection
    • Raghavan, S.1
  • 18
    • 4243616973 scopus 로고    scopus 로고
    • Enterprise-grade anti-virus automation in the 21st century
    • available at:
    • Symantec (2000), “Enterprise-grade anti-virus automation in the 21st century”, available at: www.symantec.com
    • (2000)
  • 19
    • 4243662156 scopus 로고    scopus 로고
    • How biometrics works
    • available at: www8.zdnet.com/products/stories/reviews
    • ZDNet (1999), “How biometrics works”, available at: www8.zdnet.com/products/stories/reviews
    • (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.