E-Commerce Security and Privacy
-12 %

E-Commerce Security and Privacy

 Book
Besorgungstitel| Lieferzeit:3-5 Tage I

Unser bisheriger Preis:ORGPRICE: 160,45 €

Jetzt 141,20 €*

Alle Preise inkl. MwSt. | ggf. zzgl. Versand
ISBN-13:
9780792373995
Einband:
Book
Erscheinungsdatum:
31.10.2001
Seiten:
196
Autor:
Anup K. Ghosh
Gewicht:
461 g
Format:
235x155x16 mm
Sprache:
Englisch
Beschreibung:
Brings together researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. This work introduces them to innovations in secure and private e-commerce. It is also suitable as a secondary text for a graduate level course.
List of Figures. List of Tables. Contributing Authors. Preface. Part I: Case Studies in E-Commerce Security. 1. Security Testing of an Online Banking Service; A.L.M. dos Santos, et al. 2. Software Security Analysis: An example case study; B. Arkin. 3. New Security Issues in Mobile E-Commerce; A.K. Ghosh. 4. Problems in Policing E-Commerce Crime; M.D. Goodman. Part II: Reasoning about Secure and Private E-Commerce. 5. Strategies for Developing Policies and Requirements for Secure and Private Electronic Commerce; A.I. Antón, J.B. Earp. 6. Protocols for Secure Remote Database Access with Approximate Matching; W. Du, M.J. Atallah. 7. A New Approach to Reasoning about Accountability in Cryptographic Protocols for E-Commerce; H. Wang, et al. 8. Provisional Authorizations; S. Jajodia, et al.
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself. If you have an idea for a book that is appro priate for this series, I encourage you to contact either the Acquisitions Editor for the series, Lance Wobus (lwobus@wkap.com), or myself, the Consulting Editor for the series (jajodia@gmu.edu). We would be happy about to discuss any potential projects with you. Additional information this series can be obtained from wkap.nljseries.htmjADIS.