International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 8, August 2013

Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas

In this paper, we provide a detailed description of methodology for deriving and applying Electronic Commerce (EC) security countermeasures design models from the existing IT standards. Our goal is to describe a model-based approach of how to extend such a model or specialize it in order to apply it to e-commerce systems.

Keywords: e-commerce, malicious user, Sniffing, Spoofing, Brute-force, Cryptography & Decryption

Edition: Volume 2 Issue 8, August 2013

Pages: 393 - 405


How to Cite this Article?

Tanvir Tahir, Kamar Abbas, "Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013275, Volume 2 Issue 8, August 2013, 393 - 405

33 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'e-commerce'

Case Studies, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 530 - 534

Cybercrime in ?Credit Card Systems?: Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1320 - 1324

Optimization of Data Storage and Fault Tolerance Strategies in Cloud Computing

Dr. C. Vijay Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2694 - 2699

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 939 - 942

A Novel Approach to Enhance Personalized Recommendation

G. Venkatesh, M. Sri Devi

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1891 - 1896

M_Commerce Means Mobile Computing

Shraddha C. Belsare, Anjali B. Raut

Share this article

Similar Articles with Keyword 'malicious user'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1551 - 1554

Implementation of Encryption and Decryption Technique

Dayanand G Savakar, Anand S Ghuli

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1307 - 1310

Fuzzy K-Means Based Intrusion Detection System Using Support Vector Machine

Aman Mudgal, Rajiv Munjal

Share this article

Similar Articles with Keyword 'Spoofing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2694 - 2699

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

Share this article

Similar Articles with Keyword 'Brute-force'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 403 - 408

Online Detection of Malicious Transactions from Database System

Dhanashree Parchand, Harmeet Kaur Khanuja

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 393 - 405

Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 8 Issue 8, August 2019

Pages: 522 - 525

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

Share this article

Top