Policy-Based Security for M-Commerce Networks
نویسندگان
چکیده
With the emergence of the wireless application protocol (WAP Forum, 2000) in 1998, which provided users of mobile devices with an optimized wireless protocol to access the Internet and to browse specific Web content, and with the introduction of specialized wireless programming models such as Java 2 Mobile Edition (J2ME) (Lawton, 2002), the .Net Compact Framework (Neable, 2002), and the Binary Runtime Environment for Wireless (QUALCOMM Incorp., 2004), businesses started accepting a new set of clients represented in cell phones, two-way pagers, PDAs, absTRacT
منابع مشابه
Protecting a Private Network: The AltaVista Firewall
Vol. 9 No. 2 1997 17 The advent of electronic commerce as a means of conducting business globally has resulted in an increasing number of organizations connecting their internal private networks to the Internet. Most users of the Internet and the World Wide Web (WWW) view the technologies involved as leading edge, but many are unaware that the foundations on which these technologies are built a...
متن کاملConsidering the Coefficient of Relationship between the Students’ Attitude toward Social Networks Policy making with Social Security Feeling
Abstract:This study aims at measuring the relationship between students‟ attitude toward govern-ment‟s virtual social network policy making with social security feeling, in another word, to which extent social security feeling emphasizing on social networks is determined via users‟ attitude toward government‟s media policy making? Analytical-descriptive method including survey is used in ...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملInternet Banking Law: An Iranian Perspective Problems and Prospects of Introducing Islamic Microfinance in Azerbaijan Republic
Bank supervision and monetary policy are strategic concepts in the economy of countries. Development of electronic communications, especially in online and international spheres, has largely threatened financial services in view of security and illegal access to banking networks. Anonymity and identity theft has endangered electronic commerce by crimes like phishing, fraud and different types...
متن کاملSecurity Effect on B2B and B2C Operations using 3G M-Commerce
The full scope of how mobile technologies will affect individuals‟ lives in the areas of business, education and other sectors has yet to be appreciated. Innovative mobile technologies are causing disruptive, tectonic changes that will shape inalterably the way the next generation will live, work, play and interact with the rest of the world. Indian business leaders, government, policy makers, ...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کامل