Designing a Secure E-commerce with Credential Purpose-based Access Control

Article OPEN
Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek;
  • Journal: Journal of Business & Management (COES&RJ-JBM),volume 2,issue 2 April,pages241-248
  • Subject: E-commerce, access control, security
    acm: ComputingMilieux_COMPUTERSANDSOCIETY

The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-... View more
  • References (10)

    References 1.Ackerman, M. S., & Davis Jr, D. T. (2003). Privacy and Security Issues in E-commerce. New

    Economy Handbook. 2.Agrawal, R., Kiernan, J. and Srikant, R. (2002). Hippocratic Database. Proceedings of the 28th

    International Conference on Very Large Data Bases, 143-154. 3.Chauduri, S., Kaushik, R., and Ramamurthy, R. (2011). Database Access Control & Privacy: Is

    There A Common Ground. Proceedings of the 5th Biennial Conference on Innovative Data

    Systems Research. January 9-12. Asilomar, California, USA, 2010. 96-103. 4.Dagdee, N. and Vijaywargiya, R. (2009b). Credential Based Hybrid Access Control

    Management and Engineering. 3-5 April. S.D. Bansal Coll. of Technol., Indore. 624-628. 5.LeFevre, K., Agrawal, R., Ercegovac, V. and Ramakrishnan, R. (2004). Limiting Disclosure in

    Data Bases. 30, 108-119. 6.Samarati, P. and De Capitani, S. V. (2001). Access Control: Policies, Models, and Mechanisms.

    Foundations of Security Analysis and Design. 137-196. 7.Yang, N., Barringer, H., & Zhang, N. (2008). A Purpose-Based Access Control Model. Journal

    of Information Assurance and Security. 51-58. 8.Yang, C. and Zhang, C. N. (2003). Designing Secure E-commerce with Role-based Access

    Control. Proceedings of the IEEE International Conference on E-Commerce, 2003. 313-319.

  • Metrics
Share - Bookmark