Rate the Article: Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 123 | Views: 378

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 8, August 2013 | Rating: 6.8 / 10


Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas


Abstract: In this paper, we provide a detailed description of methodology for deriving and applying Electronic Commerce (EC) security countermeasures design models from the existing IT standards. Our goal is to describe a model-based approach of how to extend such a model or specialize it in order to apply it to e-commerce systems.


Keywords: e-commerce, malicious user, Sniffing, Spoofing, Brute-force, Cryptography & Decryption


Edition: Volume 2 Issue 8, August 2013,


Pages: 393 - 405



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top