Research Article

Application-Level and Database Security for E-Commerce Application

by  Pradnya B. Rane, B. B. Meshram
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Issue 18
Published: March 2012
Authors: Pradnya B. Rane, B. B. Meshram
10.5120/5638-7896
PDF

Pradnya B. Rane, B. B. Meshram . Application-Level and Database Security for E-Commerce Application. International Journal of Computer Applications. 41, 18 (March 2012), 1-5. DOI=10.5120/5638-7896

                        @article{ 10.5120/5638-7896,
                        author  = { Pradnya B. Rane,B. B. Meshram },
                        title   = { Application-Level and Database Security for E-Commerce Application },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 41 },
                        number  = { 18 },
                        pages   = { 1-5 },
                        doi     = { 10.5120/5638-7896 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Pradnya B. Rane
                        %A B. B. Meshram
                        %T Application-Level and Database Security for E-Commerce Application%T 
                        %J International Journal of Computer Applications
                        %V 41
                        %N 18
                        %P 1-5
                        %R 10.5120/5638-7896
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today's distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an underlying database. The combination of these technologies creates a system that requires attention to the security issues of each component and the system as a whole. Hence security related to authentication, authorization and transaction database need to be managed carefully.

References
  • Vijay Ahuja," Building Trust in Electronic Commerce", IEEE/2000
  • Stuart Feldman, "The Changing Face of E-Commerce: Extending the Boundaries of the Possible", IEEE INTERNET COMPUTING, MAY • JUNE 2000
  • Timothy E. Lindquist, "Security Considerations for Distributed Web-Based e-commerce Applications in Java", IEEE/2002
  • Adam Jolly, "The Secure Online Business" (Great Britain and the United States- Kogan Page Limited 2003)
  • Donal O. Mahony, Michael Peirce Hitesh Tewari, "Electronic Payment Systems for E-Commerce" (Artech House computer security series-Boston 2001)
  • Rafae Bhatti, Elisa Bertino, Arif Ghafoor, "XML-Based Specification for Web Services Document Security", IEEEE 2004
  • Sung-Ming Yen and Chi-Sung Laih, "Improved Digital Signature Algorithm", IEEE TRANSACTIONS ON COMPUTERS, VOL. 44, NO. 5. MAY 1995
  • L. Harn," Enhancing the security of EIGamal's signature Scheme," IEEE Vol. 142, No. 5, September 1995
  • Simson L. Garfinkel, "Public key cryptography", June-1996
  • Ingemar J. Cox, Senior Member, IEEE, and Jean-Paul M. G. Linnartz, "Some General Methods for Tampering with Watermarks", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
  • Jana Dittmann, "Using Cryptographic and Watermarking Algorithms", IEEE/2001
  • Kjell Orsborn, "E-COMMERCE and SECURITY", Spring 2008
  • PATRICIA BEATTY, IAN REAY, SCOTT DICK, and JAMES MILLER, "Consumer Trust in E-Commerce Web Sites: A Meta-Study", ACM Computing Surveys, Vol. 43, No. 3, Article 14, Publication date: April 2011
  • PETER C. CHAPIN, CHRISTIAN SKALKA, and X. SEAN WANG," Authorization in Trust Management: Features and Foundations", ACM Computing Surveys, Vol. 40, No. 3, Article 9, Publication date: August 2008.
  • Nagarjuna. Settipalli,, R Manjula, "Securing Watermarked-Relational Data by Using Encryption and Decryption", Volume 1 No. 2, MAY 2011 , ARPN Journal of Systems and Software.
  • Dieter Gollmann, "E-commerce security", COMPUTING AND CONTROL ENGINEERING JOURNAL, JUNE 2000
  • Radu Sion, Mikhail Atallah, Fellow, IEEE, and Sunil Prabhakar, "Rights Protection for Relational Data", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 12, DECEMBER 2004
  • Yingjiu Li, Member, IEEE, Vipin Swarup, and Sushil Jajodia, Senior Member, IEEE," Fingerprinting Relational Databases:Schemes and Specialties", IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2005
  • Shiuh-Jeng Wang, Jia-Hung Huang, Concerns about Hash Cracking Aftereffect on Authentication Procedures in Applications of Cyberspace , IEEE A&E SYSTEMS MAGAZINE, JANUARY 20073
  • Xiangrong Xiao Xingming Sun Minggang Chen, Second-LSB-Dependent Robust Watermarking for Relational Database , 0-7695-2876-7/07 $25. 00 © 2007 IEEE DOI 10. 1109/IAS. 2007. 25
  • Haiting Cui, Xinchun Cui, Mailing Meng, A Public Key Cryptography Based Algorithm for Watermarking Relational Databases* , 978-0-7695-3278-3/08 $25. 00 © 2008 IEEE DOI 10. 1109/IIH-MSP. 2008. 194
  • Jianhua Sun,Zaihui Cao, Zhongyan Hu ,Multiple Watermarking Relational Databases Using Image , 978-0-7695-3556-2/08 $25. 00 © 2008 IEEE DOI 10. 1109/MMIT. 2008. 211
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Encryption Watermarking Steganography Salt Hashing

Powered by PhDFocusTM