Pleskach et al., 2021 - Google Patents
Current State and Trends in the Development of E-Commerce Software Protection Systems.Pleskach et al., 2021
View PDF- Document ID
- 11434286401613126901
- Author
- Pleskach V
- Krasnoshchok V
- Melnyk M
- Klymenko S
- Tumasonis R
- Publication year
- Publication venue
- IT&I Workshops
External Links
Snippet
The purpose of the article is to review and analyse the state and trends in the development of e-commerce software systems protection. The publication discusses the problems of ensuring security in e-commerce systems, and also highlights the main directions of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/3089—Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Badotra et al. | A systematic review on security of E-commerce systems | |
| Niranjanamurthy et al. | The study of e-commerce security issues and solutions | |
| Stone-Gross et al. | The underground economy of fake antivirus software | |
| Franklin et al. | An inquiry into the nature and causes of the wealth of internet miscreants. | |
| US8429545B2 (en) | System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface | |
| US9384345B2 (en) | Providing alternative web content based on website reputation assessment | |
| Ratnasingham | Internet‐based EDI trust and security | |
| US7765481B2 (en) | Indicating website reputations during an electronic commerce transaction | |
| US7822620B2 (en) | Determining website reputations using automatic testing | |
| US8516377B2 (en) | Indicating Website reputations during Website manipulation of user information | |
| US8566726B2 (en) | Indicating website reputations based on website handling of personal information | |
| US20150213131A1 (en) | Domain name searching with reputation rating | |
| US20060253584A1 (en) | Reputation of an entity associated with a content item | |
| US20060253582A1 (en) | Indicating website reputations within search results | |
| Ghazali et al. | Cloud-based global online marketplaces review on trust and security | |
| Pleskach et al. | Current State and Trends in the Development of E-Commerce Software Protection Systems. | |
| Al-Dwairi et al. | Business-to-consumer e-commerce Web Sites: Vulnerabilities, Threats and quality evaluation model | |
| Ali et al. | Security Vulnerabilities and Solution for Electronic Commerce in Iraq | |
| Amanulla et al. | 2014 Cyber-attack on eBay Case Study Analysis | |
| KACHHIA | CHAPTER–17 E-COMMERCE SECURITY–A LIFE CYCLE APPROACH | |
| Rachel | A Study on Ethical and Social Issues in E-Commerce | |
| Dahiya | Security Issues in E-commerce | |
| Parkash et al. | Multi-Layered Firewall Security System with Biometric-Sense for E-Commerce. | |
| Park et al. | E-commerce | |
| Mushthaq Ahammed | Online Transaction Security Issues In A Digitally Enabled Business Environment |