E-Commerce Authentication: An Effective Countermeasures Design Model
نویسندگان
چکیده
Existing authentication models for e-commerce systems take into account satisfying legitimate user requirements described in security standards. Yet, the process of introducing countermeasures to block malicious user requirements is ad hoc and relies completely on the security designer expertise. This leads to expensive implementation life cycles if defects related to the design model were discovered during the system-testing phase. In this paper, we describe an authentication countermeasures design model for ecommerce systems. This model includes effective countermeasures against all known malicious user requirements and attacks. The described model is preventive in nature and can be used with other authentication models or can be implemented as a stand-alone module for e-commerce systems.
منابع مشابه
E-Commerce Security A New Methodology for Deriving Effective Countermeasures Design Models
............................... ................................ ................................ .................. List of Figures................................ ................................ ................................ .........
متن کاملSSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates
Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms—if decoupled from SSL/TLS session establishment—are vulnerable to man-in-the-middle attacks. In this article, we examine the feasibility of such attacks, survey countermeasures, and explain the rationale behind SSL/TLS session-aware user authentication as a lightweight an...
متن کاملIdentification of factors influencing building initial trust in e-commerce
Nowadays, consumer trust is identified as one of the most important factors in electronic commerce (e-commerce) growth. This has led much research to investigate the role of trust in e-commerce and determine the factors which influence trust in this area. This paper explores factors which are engaged in building initial consumer trust in online shopping when a consumer wants to buy from a websi...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل