E-commerce security and privacy
Author(s)
Bibliographic Information
E-commerce security and privacy
(Advances in information security, 2)
Kluwer Academic, c2001
Available at 9 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
Description and Table of Contents
Description
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treat ment. The success of this series depends on contributions by researchers and developers such as yourself. If you have an idea for a book that is appro priate for this series, I encourage you to contact either the Acquisitions Editor for the series, Lance Wobus (lwobus@wkap.com), or myself, the Consulting Editor for the series (jajodia@gmu.edu). We would be happy about to discuss any potential projects with you. Additional information this series can be obtained from www.wkap.nljseries.htmjADIS.
Table of Contents
- List of Figures. List of Tables. Contributing Authors. Preface. Part I: Case Studies in E-Commerce Security. 1. Security Testing of an Online Banking Service
- A.L.M. dos Santos, et al. 2. Software Security Analysis: An example case study
- B. Arkin. 3. New Security Issues in Mobile E-Commerce
- A.K. Ghosh. 4. Problems in Policing E-Commerce Crime
- M.D. Goodman. Part II: Reasoning about Secure and Private E-Commerce. 5. Strategies for Developing Policies and Requirements for Secure and Private Electronic Commerce
- A.I. Anton, J.B. Earp. 6. Protocols for Secure Remote Database Access with Approximate Matching
- W. Du, M.J. Atallah. 7. A New Approach to Reasoning about Accountability in Cryptographic Protocols for E-Commerce
- H. Wang, et al. 8. Provisional Authorizations
- S. Jajodia, et al.
by "Nielsen BookData"