The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security plays a large role in e-commerce application system, the physical layer structure, anti-SQL injection, RBAC, password policy are important aspects of E-commerce application system security policy which will be analyzed in this paper.
When the network is increasingly becoming a part of people's lives at the same time, network and information security has also become one of the issues of most concern,. This article is based on a brief introduction in terms of information security, several commonly used way of authentication technologies and their advantages and disadvantages. Different levels of security authentication methods are...
The paper describes a new electronic official seal system scheme based on the technologies of MD5, RSA and USBkey. In order to guarantee the reliability of transmitting data, the system develops the toolbar by utilizing VBA to found the toolbar object in WORD and calling CryptoAPI to realize encryption and decryption, and USBkey is applied to save the key and the digital certificate. Moreover, we...
The data security is one of the biggest problems which inhibit the further application of the ASP platform. This paper put forward an ASP-based security system strategy which includes infrastructure security, safeguard security boundary and computing environment protection. An ASP-oriented intrusion detection model was also proposed, and the intrusion detection subsystem function was analyzed in detail...
Along with the never-ending changing and improving development of information technology, mankind is entering an information period with network as the main stream, and e-business based on Internet is becoming a new mode for commercial activities gradually. The greatest misgivings of enterprises to conduct e-business is safety, so this article is going to give an intensive study and analysis of identity...
Along with the rapid development of electronic commerce and the increasing Internet users, the market of electronic auction has expanded. However, online auction centers remain to be an insecure environment and the bidderspsila identities and private information may still be under threat by malicious hackers. To consider account security, among the main rules of online electronic auction is that the...
Many companies want to use Internet as a sale channel and to perform e-business transactions. However, many companies doing business on the Web are faced with security issues which must be addressed in order to protect sensitive information. Businesses must find ways to authenticate employees, customers, suppliers and partners while ensuring the security of transactions, and sensitive information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.