Showing 1 - 6 of 6
Modern access control models, developed for protecting data from accesses across the Internet, require to verify the identity of users in order to make sure that users have the required permissions for accessing the data. User's identity consists of data, referred to as identity attributes, that...
Persistent link: https://www.econbiz.de/10009430791
Trust negotiation is a promising approach for establishing trust in open systems, in which sensitive interactions may often occur between entities with no prior knowledge of each other. Although, to date several trust negotiation systems have been proposed, none of them fully address the problem...
Persistent link: https://www.econbiz.de/10009430846
This paper provides directions web and e-commerce applications security. In particular, access control policies, workflow security, XML security and federated database security issues pertaining to the web and e-commerce applications are discussed
Persistent link: https://www.econbiz.de/10014108038
This paper describes collaborative commerce (c-commerce); it essentially combines e-commerce, knowledge management and collaboration to carry out transactions and other activities within and across organizations. We first discuss the building blocks for c-commerce. Then, we describe models and...
Persistent link: https://www.econbiz.de/10014119493
The secure publication of XML data over the Internet is increasingly utilized for document exchange over the Web. Publishers of XML data need to satisfy the authenticity and confidentiality requirements of end users and information owners. Satisfying these requirements in a web environment is...
Persistent link: https://www.econbiz.de/10014120393
This paper provides directions for web and e-commerce applications security. In particular, access control policies, workflow security, XML security and federated database security issues pertaining to the web and ecommerce applications are discussed.
Persistent link: https://www.econbiz.de/10005574722