메뉴 건너뛰기




Volumn , Issue , 2011, Pages 465-480

How to shop for free online security analysis of cashier-as-a-service based web stores

Author keywords

Cashier as a service; E commerce security; Logic bug; Program verification; Web API

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); APPLICATION PROGRAMS; ELECTRONIC COMMERCE; WEB SERVICES; WEBSITES;

EID: 80051991045     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.26     Document Type: Conference Paper
Times cited : (93)

References (39)
  • 6
    • 85177692259 scopus 로고    scopus 로고
    • BigCommerce. http://www.bigcommerce.com/
  • 8
    • 85177664624 scopus 로고    scopus 로고
    • Ecommerce Statistics Compendium
    • Ecommerce Statistics Compendium 2010. http://econsultancy.com/us/reports/ e-commerce-statistics/downloads/2076-econsultancy-ecommerce-statistics-uk- sample-pdf
    • (2010)
  • 16
    • 84894088425 scopus 로고    scopus 로고
    • Toward automated detection of logic vulnerabilities in web applications
    • August
    • Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, and Giovanni Vigna, "Toward Automated Detection of Logic Vulnerabilities in Web Applications," USENIX Security Symposium, August 2010.
    • (2010) USENIX Security Symposium
    • Felmetsger, V.1    Cavedon, L.2    Kruegel, C.3    Vigna, G.4
  • 17
    • 85177674632 scopus 로고    scopus 로고
    • Fiddler Web Debugger. http://www.fiddler2.com/fiddler2
  • 20
    • 85177659963 scopus 로고    scopus 로고
    • Interspire Shopping Cart. http://www.interspire.com/shoppingcart
  • 21
    • 85177669636 scopus 로고    scopus 로고
    • Live HTTP Headers. http://livehttpheaders.mozdev.org
  • 22
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public key authentication protocol
    • Gavin Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters 56(3), 1995
    • (1995) Information Processing Letters , vol.56 , Issue.3
    • Lowe, G.1
  • 24
    • 0342880800 scopus 로고
    • Applying formal methods to the analysis of a key management protocol
    • Catherine Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security, 1992.
    • (1992) Journal of Computer Security
    • Meadows, C.1
  • 25
    • 85177676058 scopus 로고    scopus 로고
    • A formal specification of requirements for payment transactions in the SET protocol
    • Catherine Meadows and Paul F. Syverson. "A Formal Specification of Requirements for Payment Transactions in the SET Protocol," Financial Cryptography 1998
    • Financial Cryptography 1998
    • Meadows, C.1    Syverson, P.F.2
  • 28
    • 80051996457 scopus 로고    scopus 로고
    • Verified by visa and MasterCard SecureCode: Or, how not to design authentication
    • January
    • Steven Murdoch and Ross Anderson, "Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication," Financial Cryptography and Data Security, January 2010
    • (2010) Financial Cryptography and Data Security
    • Murdoch, S.1    Anderson, R.2
  • 29
    • 85177663229 scopus 로고    scopus 로고
    • NopCommerce. http://www.nopcommerce.com/
  • 31
    • 85177637163 scopus 로고    scopus 로고
    • Resources - Amazon Payments. https://payments.amazon.com/sdui/sdui/ business/resources#cba
  • 35
    • 85177688474 scopus 로고    scopus 로고
    • TopTenReviews. eCommerce Software Review 2011. http://ecommerce-software- review.toptenreviews.com
    • (2011) ECommerce Software Review
  • 39


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.