Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (6): 76-78    DOI: 10.11925/infotech.1003-3513.2004.06.20
Current Issue | Archive | Adv Search |
Multi-Lever Security Model of Electronic Commerce and Its Application
Wu Si1   Ling Yonghong2
1(Business School of Wuhan University, Wuhan 430072, China)
2(Computer School of Wuhan University of Technology, Wuhan 430070, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper summarizes today s typical security structure in electronic commerce system, then a multi-lever security model based on the traditional strategy is proposed, it avoids the disadvantage that existing security strategy severely relied on the technique and security device. The model is more emphasizes the staff-center strategy than the traditional s, it gives a new model to solve the security problem in electronic commerce system.

Key wordsElectronic commerce      Security      Security model     
Received: 02 February 2004      Published: 25 June 2004
ZTFLH: 

TP391.08

 
Corresponding Authors: Wu Si     E-mail: wusi@mail.whut.edu.cn
About author:: Wu Si,Ling Yonghong

Cite this article:

Wu Si,Ling Yonghong. Multi-Lever Security Model of Electronic Commerce and Its Application. New Technology of Library and Information Service, 2004, 20(6): 76-78.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.06.20     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I6/76

1 吴思.透明信封与网络安全.市场与电脑,2000(8)
2 王茜,杨德礼.电子商务的安全体系结构及技术研究.计算机工程,2003(1)
3 梁保恩.试析电子商务的安全技术.经济与社会发展,2003(2)
4 袁峰,蒋文杨,潘雪松.电子商务安全管理的现状及其对策.物流科技,2003(4)
5 刘思源.电子商务安全及其措施.商业研究,2003(11)
6 郑红明.企业电子商务安全问题分析.企业活力,2003(8)

[1] Zeng Zhen,Li Gang,Mao Jin,Chen Jinghao. Data Governance and Domain Ontology of Regional Public Security[J]. 数据分析与知识发现, 2020, 4(9): 41-55.
[2] Feng Wengang,Jiang Zhaofeifan. Improving Security Checks and Passenger Risk Evaluation with Classification of Airline Passengers[J]. 数据分析与知识发现, 2020, 4(12): 105-119.
[3] Lianjie Xiao,Tao Meng,Wei Wang,Zhixiang Wu. Entity Recognition of Intelligence Method Based on Deep Learning: Taking Area of Security Intelligence for Example[J]. 数据分析与知识发现, 2019, 3(10): 20-28.
[4] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[5] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[6] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[7] Feng Wengang,Huang Jing. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[8] Sun Xiaoling, Zhao Yuxiang, Zhu Qinghua. Analyzing the Demand of Online Product Review System’ s Features Using Kano Model: An Empirical Study of Chinese Online Shops[J]. 现代图书情报技术, 2013, (6): 76-84.
[9] Hu Tao, Wei Tao, Xu Haijun. Design and Implement Security Gateway System Based on Open Source Software Used in Electronic Reading Room[J]. 现代图书情报技术, 2012, 28(2): 92-97.
[10] Udhyan Timilsina, Leah Riungu-Kalliosaari, Ossi Taipale, Kari Smolander, Wang Weijun. Security Issues on Testing of Public Cloud Applications[J]. 现代图书情报技术, 2012, (11): 22-33.
[11] Zhu Yuqiang. Design and Implementation of Unattended Library Security Program Based on Camera Images[J]. 现代图书情报技术, 2011, 27(6): 95-100.
[12] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[13] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[14] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[15] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn