Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (6): 76-78    DOI: 10.11925/infotech.1003-3513.2004.06.20
Current Issue | Archive | Adv Search |
Multi-Lever Security Model of Electronic Commerce and Its Application
Wu Si1   Ling Yonghong2
1(Business School of Wuhan University, Wuhan 430072, China)
2(Computer School of Wuhan University of Technology, Wuhan 430070, China)
Download: PDF(0 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper summarizes today s typical security structure in electronic commerce system, then a multi-lever security model based on the traditional strategy is proposed, it avoids the disadvantage that existing security strategy severely relied on the technique and security device. The model is more emphasizes the staff-center strategy than the traditional s, it gives a new model to solve the security problem in electronic commerce system.

Key wordsElectronic commerce      Security      Security model     
Received: 02 February 2004      Published: 25 June 2004
: 

TP391.08

 
Corresponding Authors: Wu Si     E-mail: wusi@mail.whut.edu.cn
About author:: Wu Si,Ling Yonghong

Cite this article:

Wu Si,Ling Yonghong. Multi-Lever Security Model of Electronic Commerce and Its Application. New Technology of Library and Information Service, 2004, 20(6): 76-78.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.06.20     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I6/76

1 吴思.透明信封与网络安全.市场与电脑,2000(8)
2 王茜,杨德礼.电子商务的安全体系结构及技术研究.计算机工程,2003(1)
3 梁保恩.试析电子商务的安全技术.经济与社会发展,2003(2)
4 袁峰,蒋文杨,潘雪松.电子商务安全管理的现状及其对策.物流科技,2003(4)
5 刘思源.电子商务安全及其措施.商业研究,2003(11)
6 郑红明.企业电子商务安全问题分析.企业活力,2003(8)

[1] Longjia Jia,Bangzuo Zhang. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[2] Guang Zhu,Mining Feng,Weiwei Zhang. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[3] Wen’gang Feng,Yan Li,Fuhai Li,Xin Wang,Xiping Zhou. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[4] Wengang Feng,Jing Huang. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[5] Sun Xiaoling, Zhao Yuxiang, Zhu Qinghua. Analyzing the Demand of Online Product Review System’ s Features Using Kano Model: An Empirical Study of Chinese Online Shops[J]. 现代图书情报技术, 2013, (6): 76-84.
[6] Hu Tao, Wei Tao, Xu Haijun. Design and Implement Security Gateway System Based on Open Source Software Used in Electronic Reading Room[J]. 现代图书情报技术, 2012, 28(2): 92-97.
[7] Udhyan Timilsina, Leah Riungu-Kalliosaari, Ossi Taipale, Kari Smolander, Wang Weijun. Security Issues on Testing of Public Cloud Applications[J]. 现代图书情报技术, 2012, (11): 22-33.
[8] Zhu Yuqiang. Design and Implementation of Unattended Library Security Program Based on Camera Images[J]. 现代图书情报技术, 2011, 27(6): 95-100.
[9] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[10] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[11] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[12] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[13] Wei Chengfu,Wu Xu,Zhang Hua. Design and Realization of Web Application in Network Behavior Security Auditing System[J]. 现代图书情报技术, 2009, 3(2): 96-101.
[14] Xu Yandong,Li Yu. Research and Design of Single Sign On System of the National Science Library[J]. 现代图书情报技术, 2009, (10): 28-33.
[15] Ni Wenyin,Yin Feng,Huang Jianqi. The Research of Security Model and Access Control Security Strategy of Digital Library in Grid Computing Environment[J]. 现代图书情报技术, 2008, 24(4): 75-79.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn