Font Size: a A A

The Studies On Some Technology Problems About The Information Resource Security Management In Electronic Commerce System

Posted on:2011-05-20Degree:DoctorType:Dissertation
Country:ChinaCandidate:M W ZhaoFull Text:PDF
GTID:1119360305955687Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
E-commerce system, which refers to transaction activities, realized by communication network and information technology in order to complete the information exchange among computers. In addition, this system contains various functions to help the information resource management. It is a product combined with advanced computer technology,multi-media technology,network technology and communication technology. The E-commerce system has broad space for its application with the rapid development of those advanced information technologies.In E-commerce system, information resource refers to the static data information and dynamic data information used in communication exchange stored in system. The security technology problems of the information resource security management are significant and very challenging research subject. Copyright protection,identity authentication and E-contract etc. are most important components in E-commerce system. They have important theoretical and practical significance for the promotion and application of the E-commerce system.This paper designed the system frame of information resource security management in a simplified E-commerce system based on above problems and made deep theoretical research and discussion in security technology problems in the following aspects. In addition, we have developed the medical teaching instrument E-commerce system successfully with the research achievements.(1) For the problem of copyright protection of data information, taking the color image file for an instance, we proposed the color image copyright protection digital watermark model based on discrete wavelet transform (DWT) and discrete cosine transform. We designed data work copyright protection system based on watermark According to the emulation results, the improved means possesses better anti-attack feature in color image process especially in lossy compression. Taking random files stored in memory, we proposed transparent encryption system prototype based on the filter driver technology and designed data information anti-copy system based on transparent encryption technology. The experimental results demonstrated that this model had excellent anti-copy performance.(2) For the security problem of system access authority, For example, in user login system, we proposed Public-key cryptosystem based on ElGamal and put forward a dynamic password identity authentication system utilizing the challenge response mechanism, two way authentication safe and high efficient dynamic password identity authentication model. This model avoided problems caused by the requirement of keeping time synchronization between user and server effectively and improved latent danger existed in static password authentication. It also realized two way authentications between user and server, in this way, system is able to prevent the counterfeit server attack and replay attack etc. and reduce calculating works of server.(3) For the security problem of network information transmission. We designed E-contracts signature system. For example, in order to solve problems existing in E-contracts signature protocol (that is sponsor will stay in waiting state if sponsor can't receive contract signature from replier for a long time), we proposed a safe and effective E-contracts signature protocol model and designed E-contract sign system. This protocol includes three sub-protocol:contract signature exchange sub contract,signature cancel sub contract and dispute resolution sub contract. In particular, the signature cancel sub contract has the ability to cancel the signature of the contract sponsor. The signer will not stay in the waiting state always if abnormal events happen.Finally, we have developed the medical teaching instruments E-commerce system instance by applying above theories and technologies, which protected the information resource security in E-commerce system effectively.
Keywords/Search Tags:E-commerce system, information resource security management, Copyright protection, dynamic password authentication, electronic contract
PDF Full Text Request
Related items