Font Size: a A A

E-commerce Security Architecture And Key Technologies Research

Posted on:2007-09-08Degree:MasterType:Thesis
Country:ChinaCandidate:H WangFull Text:PDF
GTID:2208360185483666Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In recent years, with the development of Internet, there is an Electronic Commerce fever all over the world .Many nation's governments are paying attention to the Electronic Commerce development and regard it as equally important as the steam engine in 19th century. However because the insecurity events continuously occur, the security in Electronic is doubted, Security problem is a bottleneck in the development of Electronic Commerce. Therefore, researches on the safety in the electronic commerce not only have the theories value but of practical value.The main security threats faced by electronic commerce are as following: the information being intercepted and captured during the transmission on network; the transmitted document being tampered with; the forgery of e-mails; the counterfeit of other's identity and the non-recognition of done deal etc. These threats will seriously affect the application and popularization of electronic commerce if they can't be solved effectively.According to system structure of electronic commerce security, the thesis made a deep anatomy of the threats from various levels of network service, encrypting technique, security authentication, deal protocol and business system respectively and put forward some improving measures. In chapter 2, the system structure of electronic commerce security technique was put forward from the angel of levels. In chapter 3 the security of electronic commerce operating on TCP/IP network was studied; the technology of firewall and VPN were main studied; a new type of firewall based on intelligent defense was put forward; In chapter4,certificate authority especially the digital Signature and the system structure of CA were discussed; In chapter5,two Secure Electronic Transaction SSL and SET was studied.
Keywords/Search Tags:Electronic Commerce, network Security, Encryption Techniques, Secure Electronic Transaction
PDF Full Text Request
Related items