Protocols for Secure Electronic Commerce, Second Edition

* Presents a complete compendium of the protocols that secure electronic commerce and online payments * Refers to a companion Web site that contains online presentations on the topics discussed in each section * Assists students and instructors by offering review questions at the end of ev...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Hashem Sherif, Mostafa
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1362
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1362
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description * Presents a complete compendium of the protocols that secure electronic commerce and online payments * Refers to a companion Web site that contains online presentations on the topics discussed in each section * Assists students and instructors by offering review questions at the end of every chapter * than 250 figures and charts * Provides a solid review of concepts while referring to more detailed or specialized works in the bibliography * Updates the text to reflect technical advances and ongoing developments in emerging areas such as mobile commerce The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology. The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money. Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.
format Book
author Hashem Sherif, Mostafa
spellingShingle Hashem Sherif, Mostafa
Protocols for Secure Electronic Commerce, Second Edition
author_facet Hashem Sherif, Mostafa
author_sort Hashem Sherif, Mostafa
title Protocols for Secure Electronic Commerce, Second Edition
title_short Protocols for Secure Electronic Commerce, Second Edition
title_full Protocols for Secure Electronic Commerce, Second Edition
title_fullStr Protocols for Secure Electronic Commerce, Second Edition
title_full_unstemmed Protocols for Secure Electronic Commerce, Second Edition
title_sort protocols for secure electronic commerce, second edition
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1362
_version_ 1757676363519623168
spelling oai:scholar.dlu.edu.vn:DLU123456789-13622009-11-27T09:40:04Z Protocols for Secure Electronic Commerce, Second Edition Hashem Sherif, Mostafa * Presents a complete compendium of the protocols that secure electronic commerce and online payments * Refers to a companion Web site that contains online presentations on the topics discussed in each section * Assists students and instructors by offering review questions at the end of every chapter * than 250 figures and charts * Provides a solid review of concepts while referring to more detailed or specialized works in the bibliography * Updates the text to reflect technical advances and ongoing developments in emerging areas such as mobile commerce The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology. The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money. Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards. Overview of Electronic Commerce * What Is Electronic Commerce? * Categories of Electronic Commerce * The Influence of the Internet * Infrastructure for Electronic Commerce * Network Access * Consequences of E-commerce Money and Payment Systems * The Mechanisms of Classical Money * Instruments of Payment * Types of Dematerialized Monies * Purses and Holders * Transactional Properties of Dematerialized Currencies * Overall Comparison of the Means of Payment * The Practice of Dematerialized Money * Banking Clearance and Settlement Algorithms and Architectures for Security * Security of Commercial Transactions * Security of Open Financial Networks * Security Objectives * OSI Model for Cryptographic Security * Security Services at the Link Layer * Security Services at the Network Layer * Security Services at the Application Layer * Message Confidentiality * Data Integrity * Identification of the Participants * Authentication of the Participants * Access Control * Denial of Service * Nonrepudiation * Secure Management of Cryptographic Keys * Exchange of Secret Keys: Kerberos * Public Key Kerberos * Exchange of Public Keys * ISAKMP (Internet Security Association and Key Management Protocol) * SKIP (Simple Key Management for Internet Protocols) * Key Exchange Algorithm * Certificate Management * Encryption Cracks * Appendix I: Principles of Symmetric Encryption * Appendix II: Principles of Public Key Encryption * Appendix III: Principles of the Digital Signature Algorithm (DSA) * Appendix IV: Comparative Data * Business-to-Business Commerce * Overview of Business-to-Business Commerce * Examples of Business-to-Business Electronic Commerce * Business-to-Business Electronic Commerce Platforms * Obstacles Facing Business-to-Business Electronic Commerce Business-to-Business Electronic Commerce Systems * Structured Alphanumeric Data * Structured Documents or Forms * EDI Messaging * Security of EDI * Relation of EDI with Electronic Funds Transfer * Electronic Billing * EDI Integration with Business Processes * Standardization of the Exchanges of Business-to-Business * Electronic Commerce SSL (Secure Sockets Layer) * General Presentation of the SSL Protocol * SSL Subprotocols * Example of SSL Processing * Performance Acceleration * Implementations Appendix 5.1: Structures of the Handshake Messages * TLS (Transport Layer Security) and WTLS (Wireless Transport Layer Security) * From SSL to TLS * WTLS The SET Protocol * SET Architecture * Security Services of SET * Certification * Purchasing Transaction * Optional Procedures in SET * SET Implementations * Evaluation Composite Solutions * C-SET and Cyber-COMM * Hybrid SSL/SET Architecture * 3-D Secure * Payments with CD-ROM Micropayments and Face-to-Face Commerce * Characteristics of Micropayment Systems * Potential Applications * Chipper® * GeldKarte * Mondex * Proton * Harmonization of Electronic Purses Remote Micropayments * Security with out Encryption: First Virtual * NetBill * KLELine * Millicent * PayWord * MicroMint * eCoin * Comparison of the Different First-Generation Remote Micropayment Systems * Second-Generation Systems Digital Money * Building Blocks * DigiCash (Ecash) * NetCash Dematerialized Checks * Classical Processing of Paper Checks * Dematerialized Processing of Paper-Based Checks * NetCheque * Bank Internet Payment System (BIPS) * eCheck * Comparison of Virtual Checks with Bankcards Security of Integrated Circuit Cards * Overview * Description of Integrated Circuit Cards * Standards for Integrated Circuit Cards * Security of Microprocessor Cards * Multiapplication Smart Cards * Integration of Smart Cards with Computer Systems * Limits on Security Systems of Electronic Commerce * SEMPER * CAFE * JEPI * PICS and P3P * Analysis of User Behavior * Fidelity Cards * Quality of Service Considerations Electronic Commerce in Society * Communication Infrastructure * Harmonization and Standardization * Issuance of Electronic Money * Protection of Intellectual Property * Electronic Surveillance and Privacy * Filtering and Censorship * Taxation of Electronic Commerce * Fraud Prevention * Archives Dematerialization Web Sites * General * Standards * Encryption * KERBEROS * Certification * Biometrics * EDIFACT * XML * Integration XML/EDIFACT * SSL/TLS/WTLS * SET * Purses * Micropayments * Smart (Microprocessor) Cards * Electronic and Virtual Checks * SEMPER * Labeling Organizations * Organizations 2009-11-27T09:40:04Z 2009-11-27T09:40:04Z 2003 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1362 en application/octet-stream CRC Press