Nowadays electronic commerce services have risen
to become more and more popular on Internet and Web
environment. Exchange security on network is very important for
e-commerce service and it is always the key factor that affects
the success of electronic commerce (e-commerce). In this paper,
we discuss some security related issues about traditional and new
generation of e-commerce model, such as authentication,
authorization, non-repudiation, and integrity in P2P model;
moreover, we discuss some trust models in P2P e-commerce. By
analyzing the main features of P2P e-commerce, we sum up
some design principles of trust model in P2P e-commerce. We
provide a thorough overview about the network security issues
that surround e-commerce and e-commerce applications and
propose a corresponding research framework for security in ecommerce.
We believe that as long as the security issues are
adequately addressed, the P2P e-commerce would achieve great
success in the future e-commerce markets in comparison to other
security methods.
A lot of research on e-commerce security is going on and
many security products and systems of ecommerce are
being developed and marketed. In this situation, it is
important to note that security is a system property of the
e-commerce. The best we can do is to show that a specific
system is resistant against a set of well-known attacks.
[1] Yuan sen. Introduction of E-Bunsiness Security
Technology. Software Publication, BeiJing. 2009.
[2] Peng Xinying. Research on e-bunsiness security. Gansu
Science and technology, 2009, 25(2): 43-45.
[3] Feilong PENG. A trust model for e-commerce based on
XKMS. Computer Applications and Software, 2008,
25(1):140-142.
[4] Qi XIE, Lihong ZHAO. Research and realization of web
services security. Computer Engineering and Design,
2007, 28(1): 4366-4368.
[5] Zhu Lingxi. E-Bunsiness Security. BeiJing. Beijing
Jiaotong University. 2006.
[6] W3C Working Group Note, “Web services
architecture”, http://www.w3c.org/TR/ws-arch, 2004.
[7] IBM,Microsoft,Verisign,“WS-Security
Specification1.0”,http://www.ibm.com/developerworks/l
ibrary/wssecure, 2002.
[8] Sheila Frankel and Ray Perlner “Quantum Key
Distribution (QKD) and Commodity Security Protocols:
Introduction and Integration” International Journal
Network Security & Its pplications (IJNSA), Vol 1, No
2, July 2009.
[9] C. Elliott, D. Pearson, and G. Troxel, "Quantum
cryptography in practice," Karlsruhe, Germany:
Proceedings of the 2003 conference on Applications,
technologies, architectures, and protocols for computer
communications 2003.
[10] Alan Mink, dbart and S Wiesner, “Quantum
cryptography or unforgeable subway tokens Advances
in Cryptology”
Proceedings of Crypto.August 1982
[11] Nelson, B., Phillips, A., Enfinger, F., and Steuart, C.
Guide to Computer Forensics and
Investigations.Boston:Thomson Course Technology,
2004.articles/cryptography/introduction-to-modern.
[12] Charles H. Bennett, “Quantum Cryptography Using Any
Two Nonorthogonal States”,IBM Rearch Division,T.J.
Watson Research Center, Yorktown Heights,New York
10598
[13] Gerald Scharitzer, “Basic Quantum Cryptography”
Vienna University of technology, Institute of
Automation.
[14] Bennett C H G Brassard S Brei[1] C.-H. F. Fung, K.
Tamaki, and H.-K. Lo, "Performance of two quantum
keydistribution Protocols," Phys. Rev.vol. 73, 2006.