[go: up one dir, main page]

Pleskach et al., 2021 - Google Patents

Current State and Trends in the Development of E-Commerce Software Protection Systems.

Pleskach et al., 2021

View PDF
Document ID
11434286401613126901
Author
Pleskach V
Krasnoshchok V
Melnyk M
Klymenko S
Tumasonis R
Publication year
Publication venue
IT&I Workshops

External Links

Snippet

The purpose of the article is to review and analyse the state and trends in the development of e-commerce software systems protection. The publication discusses the problems of ensuring security in e-commerce systems, and also highlights the main directions of …
Continue reading at ceur-ws.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/3089Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Badotra et al. A systematic review on security of E-commerce systems
Niranjanamurthy et al. The study of e-commerce security issues and solutions
Stone-Gross et al. The underground economy of fake antivirus software
Franklin et al. An inquiry into the nature and causes of the wealth of internet miscreants.
US8429545B2 (en) System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
US9384345B2 (en) Providing alternative web content based on website reputation assessment
Ratnasingham Internet‐based EDI trust and security
US7765481B2 (en) Indicating website reputations during an electronic commerce transaction
US7822620B2 (en) Determining website reputations using automatic testing
US8516377B2 (en) Indicating Website reputations during Website manipulation of user information
US8566726B2 (en) Indicating website reputations based on website handling of personal information
US20150213131A1 (en) Domain name searching with reputation rating
US20060253584A1 (en) Reputation of an entity associated with a content item
US20060253582A1 (en) Indicating website reputations within search results
Ghazali et al. Cloud-based global online marketplaces review on trust and security
Pleskach et al. Current State and Trends in the Development of E-Commerce Software Protection Systems.
Al-Dwairi et al. Business-to-consumer e-commerce Web Sites: Vulnerabilities, Threats and quality evaluation model
Ali et al. Security Vulnerabilities and Solution for Electronic Commerce in Iraq
Amanulla et al. 2014 Cyber-attack on eBay Case Study Analysis
KACHHIA CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH
Rachel A Study on Ethical and Social Issues in E-Commerce
Dahiya Security Issues in E-commerce
Parkash et al. Multi-Layered Firewall Security System with Biometric-Sense for E-Commerce.
Park et al. E-commerce
Mushthaq Ahammed Online Transaction Security Issues In A Digitally Enabled Business Environment