Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 123

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 8, August 2013

Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas

In this paper, we provide a detailed description of methodology for deriving and applying Electronic Commerce (EC) security countermeasures design models from the existing IT standards. Our goal is to describe a model-based approach of how to extend such a model or specialize it in order to apply it to e-commerce systems.

Keywords: e-commerce, malicious user, Sniffing, Spoofing, Brute-force, Cryptography & Decryption

Edition: Volume 2 Issue 8, August 2013

Pages: 393 - 405

Share this Article

How to Cite this Article?

Tanvir Tahir, Kamar Abbas, "Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013275, Volume 2 Issue 8, August 2013, 393 - 405

Enter Your Email Address




Similar Articles with Keyword 'e-commerce'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 939 - 942

A Novel Approach to Enhance Personalized Recommendation

G. Venkatesh, M. Sri Devi

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Downloads: 105 | Weekly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2095 - 2097

Trust Evaluation by Mining of E-commerce Feedback Comments

Priyanka Kumbhar, Manjushri Mahajan

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1320 - 1324

Optimization of Data Storage and Fault Tolerance Strategies in Cloud Computing

Dr. C. Vijay Kumar

Share this Article

Similar Articles with Keyword 'malicious user'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 108

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Downloads: 110 | Weekly Hits: ⮙3

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1551 - 1554

Implementation of Encryption and Decryption Technique

Dayanand G Savakar, Anand S Ghuli

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Similar Articles with Keyword 'Spoofing'

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 104 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2694 - 2699

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Similar Articles with Keyword 'Brute-force'

Downloads: 123

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 393 - 405

Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas

Share this Article

Downloads: 132 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 403 - 408

Online Detection of Malicious Transactions from Database System

Dhanashree Parchand, Harmeet Kaur Khanuja

Share this Article

Downloads: 172

Research Paper, Computer Science & Engineering, Iraq, Volume 8 Issue 8, August 2019

Pages: 522 - 525

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

Share this Article



Top