A Survey on Various Online Transaction, E-Commerce Security and Applications
Keywords:
Trusted Platform Module, Trusted Computing Group, SecurityAbstract
While the usage of ecommerce application, information and communication technology enhances in private and professional existence, personal data is extensively stored. While service providers require relying on recognizing their consumers, aware characteristics administration and privacy increases into a new assessment for the service user, particularly in the electronic service circumstance. At this time, recent technology infrastructures can support in on condition that security to both sides by assuring identification and privacy at the same time.
References
Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification).
Brickell, E. F., Camenisch, J., and Chen, L. Direct Anonymous Attestation. In 11th ACM Conference on Computer and Communications Security (CCS 2004) (2004), V. Atluri, B. Pfitzmann, and P. D. McDaniel, Eds., ACM, pp. 132–145.
Camenisch, J. Better Privacy for Trusted Computing Platforms: (Extended Abstract). In 9th European Symposium on Research In Computer Security (ESORICS 2004) (2004), P. Samarati, P. Y. A. Ryan, D. Gollmann, and R. Molva, Eds., vol. 3193 of Lecture Notes in Computer Science, Springer, pp. 73–88.
Sailer, R., Zhang, X., Jaeger, T., and van Doorn, L. Design and Implementation of a TCG-based Integrity Measurement Architecture. In 13th USENIX Security Symposium (2004), USENIX, pp. 223–238.
A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure overlay services. In Proceedings of ACM SIGCOMM, 2002.
TCG (2008) TPM Spezifikationen der Trusted Computing Group [Specifications of the Trusted Computing Group], https://www.trustedcomputinggroup.org/specs/TPM.
European Multilaterally Secure Computing Base (EMSCB) (2008) Turaja Technology, http://www.emscb.de/content/pages/About-Turaya-de.htm.
ARM (2008) ARM processor architecture, security extension ARM Trust Zone technology, http://www.arm.com/products/esd/trustzone_home.html, .
Rankl, W.; Effing, W. (2002) Handbuch der Chipkarten, 4th edition, Munich, Carl Hanser Verlag.
Swoboda, J., Spitz, S., Pramateftakis, M. (2008) Kryptographie und IT Sicherheit, Wiesbaden, Vieweg-Teubner, ISBN 978-3-8348-0248-4.
InspireD (2005) D6 Communication Architecture Definition (Draft), forthcoming on http://www.inspiredproject.com.
Trusted Computing Group. http://www.trustedcomputinggroup.org/ (05 April 2010).
Ekberg, J.-E., and Kylänpää, M. Mobile Trusted Module (MTM) – an introduction, Nov. 2007. http://research.nokia.com/files/NRCTR2007015.pdf.
D. Challener, K. Yoder, F. Catherman, D. Saord, and L. V. Coorn. A Practical Guide to Trusted Computing. Pearson plc IBM press, 2008. ISBN-13: 978-0-13-239842-8.
http://www.ecommerce-digest.com/7_8.html. (Accessed 23 Sept 2013).
Christoph Kern, Anita Kesavan, and NeilDaswani, Foundations of Security: What Every Programmer Needs to Know.
Raghav Gautam, Sukhwinder Singh, “Network Security Issues in e-Commerce” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
Ashish Kr. Luhach, Dr. Sanjay K. Dwivedi, Dr. C. K. Jha. “Designing A Logical Security Framework For E-Commerce System Based On SOA” International Journal on Soft Computing (IJSC) Vol. 5, No. 2, May 2014.
Khandare Nikhil B., “Transaction Security for Internet E-commerce Application” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015.
Ankur Chaudhary, Khaleel Ahmad, M.A. Rizvi, “E-commerce Security Through Asymmetric Key Algorithm” Fourth International Conference on Communication Systems and Network Technologies, 2014.
Thembekile O. Mayayise, Isaac O. Osunmakinde, “A Compliant Assurance Model for Assessing the Trustworthiness of Cloud-based E-Commerce Systems” 2014.
Luca Mazzola, Aris Tsois, Tatyana Dimitrova, and Elena Camossi, “Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification” European Intelligence and Security Informatics Conference, 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
