Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 8, August 2013

Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas

In this paper, we provide a detailed description of methodology for deriving and applying Electronic Commerce (EC) security countermeasures design models from the existing IT standards. Our goal is to describe a model-based approach of how to extend such a model or specialize it in order to apply it to e-commerce systems.

Keywords: e-commerce, malicious user, Sniffing, Spoofing, Brute-force, Cryptography & Decryption

Edition: Volume 2 Issue 8, August 2013

Pages: 393 - 405

Share this Article

How to Cite this Article?

Tanvir Tahir, Kamar Abbas, "Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013275, Volume 2 Issue 8, August 2013, 393 - 405

86 PDF Views | 79 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'e-commerce'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 893 - 898

Design New Security Protocol against Online Password Guessing Attacks

Nitin. R. Shinde, S. K. Sonkar

Share this Article

Case Studies, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 530 - 534

Cybercrime in "Credit Card Systems": Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1131 - 1133

A Customer Centric Improved Cloud Service Model

Khaled Hamed Abdulla Bouba, Prateek Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2048 - 2051

An Efficient Product Aspect Ranking and its Application: A Review

Shahuraj Patil, Jyoti Raghatwan

Share this Article

Similar Articles with Keyword 'malicious user'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2198 - 2201

Defense against SQL Injection and Cross Site Scripting Vulnerabilities

Kirti Randhe, Vishal Mogal

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Similar Articles with Keyword 'Spoofing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Similar Articles with Keyword 'Brute-force'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 403 - 408

Online Detection of Malicious Transactions from Database System

Dhanashree Parchand, Harmeet Kaur Khanuja

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 393 - 405

Methodology for Deriving and Integrating Countermeasures Design Models for Electronic Commerce Systems

Tanvir Tahir, Kamar Abbas

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 8 Issue 8, August 2019

Pages: 522 - 525

Secure Image Encryption Method Using Hyperchaotic Systems

Hayder Abbood Qasim

Share this Article
Top