Please wait a minute...
New Technology of Library and Information Service  2006, Vol. 1 Issue (11): 69-72    DOI: 10.11925/infotech.1003-3513.2006.11.17
Current Issue | Archive | Adv Search |
A Security Management Framework for E-commerce Based on OWL
Li Hui    Liu Dongsu    Wang Yu
(Economic and Management College, Xidian University,Xi’an 710071,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper proposes a management framework which can effectively solve the security problem of E-commerce. And classifies the assets of E-commerce system, assesses security risks with a method which integrates qualitative methods and quantitative methods, and gives the hierarchal structure of E-commerce security policies. In this framework security repository is established by using Web Ontology Language (OWL), which makes security information is easily identified by computers and realizes intelligent and dynamic security management.

Key wordsSecurity management      Asset analysis      Risk assessment      Security policy     
Received: 15 August 2006      Published: 25 November 2006
: 

TP393.08

 
Corresponding Authors: Li Hui     E-mail: huili526@sohu.com
About author:: Li Hui,Liu Dongsu,Wang Yu

Cite this article:

Li Hui,Liu Dongsu,Wang Yu . A Security Management Framework for E-commerce Based on OWL. New Technology of Library and Information Service, 2006, 1(11): 69-72.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2006.11.17     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2006/V1/I11/69

1Whe Dar Lin. Toward a Security EC Transaction on Web. EC-Web 2003, LNCS 2738,115-124
2Kleist V F. A Transaction Cost Model of Electronic Trust:Transactional Return, Incentives for NetworkSecurity and Optimal Risk in the Digital Economy. Electronic Commerce Research, 2004(4): 41–57
3傅少川,张文杰,马军.电子商务风险分析及定性评估方法研究. 情报杂志,2005,24(5):17-19
4王绍斌,洪帆,朱贤. 一种新的基于电子现金的电子商务模型与协议.计算机工程与应用,2004, 40(17):32-35
(下转第6页)5W3C. RDF For Web Service Policy Assertions. http://www.w3.org/2004/08/20-ws-pol-pos/ ( Accessed May.6,2006)
6B. Moore, E. Ellesson, J. Strassner, A. Westerinen. Policy Core Information Model——Version 1 Specification. http://rfc.net/rfc3060.html ( Accessed May.6,2006)
7David Martin, Mark Burstein, etc. OWL-S: Semantic Markup for Web Services. http://www.daml.org/services/owl-s/1.0/owl-s.html ( Accessed May.6,2006)

[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Liu Minghui. Risk Assessment of Civil Aviation Terrorism Based on K-means Clustering[J]. 数据分析与知识发现, 2018, 2(10): 21-26.
[3] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[4] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[5] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[6] Huang Shuiqing,Chen Shuangxi,Ren Ni. Research of Risk Assessment Model of Digital Library Information Security Based on ISO27001[J]. 现代图书情报技术, 2009, 25(6): 44-49.
[7] DAVID PEARSON. AONS II: Continuing the Trend Towards Preservation Software ‘Nirvana’[J]. 现代图书情报技术, 2008, 24(1): 42-49.
[8] Ye Jian,Shao Jing,Yan Xiaodi . Application of WLAN Security and Network Management  Technology in University Library[J]. 现代图书情报技术, 2006, 1(7): 85-88.
[9] Wang Xinjun. Security Management of Library Intranet  in Combined Universities[J]. 现代图书情报技术, 2004, 20(7): 35-37.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn