Security Issues in M{Commerce: A Usage{Based Taxonomy
#1

Abstract.
M{commerce is a new area arising from the marriage of elec-
tronic commerce with emerging mobile and pervasive computing tech-
nology. The newness of this area|and the rapidness with which it is
emerging|makes it dicult to analyze the technological problems that
m{commerce introduces|and, in particular, the security and privacy is-
sues. This situation is not good, since history has shown that security
is very dicult to retro{ t into deployed technology, and pervasive m{
commerce promises (threatens?) to permeate and transform even more
aspects of life than e{commerce and the Internet has. In this paper, we
try to begin to rectify this situation: we o er a preliminary taxonomy
that uni es many proposed m{commerce usage scenarios into a single
framework, and then use this framework to analyze security issues.
1 Introduction
In the last few years, advances in and widespread deployment of information
technology have triggered rapid progress in e{commerce. This includes automa-
tion of traditional commercial transactions (electronic retailing, etc.) as well
as the creation of new transaction paradigms that were infeasible without the means of widely deployed information technology. New paradigms include electronic auctioning of purchase orders, as well as novel, money{less transaction models such as Napster [14]. E{commerce has heightened the focus on security both of systems and also for messaging and transactions [7,11].
In much the same way, recent advances in handheld personal digital assis-
tants (PDAs), wireless communication technology [17,19,26], and pervasive infrastructure [8,12,10,25,21] promise to extend this rich, comfortable environment to mobile users, and potentially to erase the distinction between the \o {line" and \on{line" worlds. As with e{commerce, we expect to see both the migration of current transaction models, as well as the emergence of new models made
possible by this technology. Possible scenarios include

Download full report
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar on wireless threat taxonomy, human classification taxonomy, current usage of eyeblink sensor, new taxonomy of ddos attacks types, comma usage result, tree usage in tamil, water usage meter circuit,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cloud Computing Security: From Single to Multi-Clouds 1 844 14-02-2017, 04:56 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,409 16-03-2015, 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,281 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,718 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,682 29-07-2013, 11:09 AM
Last Post: computer topic
  A Web Usage Mining Framework for Mining Evolving User Profiles in Dynamic Web Site project topics 1 2,356 13-12-2012, 12:22 PM
Last Post: Guest
  Internet Security and Firewall Design smart paper boy 1 1,878 10-12-2012, 01:23 PM
Last Post: seminar details
  Security in Wireless Networks nit_cal 1 1,423 12-11-2012, 01:41 PM
Last Post: seminar details
  Network Analysis & Security computer science topics 1 2,017 09-11-2012, 12:02 PM
Last Post: seminar details

Forum Jump: