Font Size: a A A

Research On The C2C Commerce Security Based On Trusted-Computing

Posted on:2009-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:G W HanFull Text:PDF
GTID:2178360275471371Subject:Business Administration
Abstract/Summary:PDF Full Text Request
Electronic commerce exchange in abstract space, It is a huge reformation of tradition commerce ,ir is important in economy of our conutry。C2c is the fast part in electronic commerce。With the rapid development of Information Technology, Electronic Commerce has become a new way for people to pursue commerce。But at the same time, the security problem of Electronic Commerce is becoming more and more obvious,So,the book intraduce how to use trusted Computing to solve the problem of C2C secuity.Firstly, this introduces and analyzes the main demand of security and structure of C2C electronic commerce,analyze the problem and pratice of C2C secuity,analyze the secuity product about trusted Computing, and expounds the significance of identity authentication in Electronic Commerce and the first defense of Electronic Commerce security is identity authentication, so the thesis mainly analyzes and probes the technologies of identity authentication。Secondly, it analyzes and probes the current state of trusted Computing deeply, then sorts it and finds security leakage and deficiency。Lastly, the thesis gives a new solution to the identity authentication, namely double network dynamic identity authentication base on trusted Computing, and designs an EC identity authentication mode that uses current mobile communications network, and analyzes the security of this mode, and raises some improvement。So,this text analyze the problem in electronic commerce secuity,and how to solve thexe problrm in trusted Computing, technology,administration and law.
Keywords/Search Tags:Electronic Commerce, C2C, status authentication, trust technology, root of trust
PDF Full Text Request
Related items