E-COMMERCE SECURITY WITH SECURE ELECTRONIC TRANSACTION PROTOCOL : A SURVEY AND IMPLEMENTATION
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
X. Zhang, Q. Huang and P. Peng, "Implementation of a Suggested E-commerce Model Based on SET Protocol," 2010 Eighth ACIS International Conference on Software Engineering Research, Management and Applications, Montreal, QC, Canada, 2010, pp. 67-73.
A. Sun, "Optimization Study for Lightweight Set Protocol," 2012 International Conference on Industrial Control and Electronics Engineering, Xi'an, 2012, pp. 1206-1209.
X. Liu, "The Study on E-commerce Security Based on ECC and SET," 2011 Third International Conference on Communications and Mobile Computing, Qingdao, 2011, pp. 85-87.
X. Fei, A. M. Zhang and W. Liang, "Formalizing and Checking SET Protocol Based on TLA," 2010 International Conference on E-Product E-Service and E-Entertainment, Henan, 2010, pp. 1-3.
S. p. Chen, "Study on a Safe and Efficient Payment Model in E-Commerce," 2008 International Conference on Advanced Computer Theory and Engineering, Phuket, 2008, pp. 860-864.
X. Zhang and L. Wang, "Key Technologies for Security Enhancing of Payment Gateway," 2008 International Symposium on Electronic Commerce and Security, Guangzhou City, 2008, pp. 743-748.
M. C. Ruiz, D. Cazorla, F. Cuartero and J. J. Pardo, "A formal specification and performance evaluation of the purchase phase in the SET protocol," Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05), 2005, pp. 6 pp.-.
Seokwon Yang, S. Y. W. Su and H. Lam, "A non-repudiation message transfer protocol for e-commerce," EEE International Conference on E-Commerce, 2003. CEC 2003., 2003, pp. 320-327.
G. Bella, F. Massacci and L. C. Paulson, "Verifying the SET registration protocols," in IEEE Journal on Selected Areas in Communications, vol. 21, no. 1, pp. 77-87, Jan 2003.
M. Papa, O. Bremer, J. Hale and S. Shenoi, "Formal analysis of e-commerce protocols," Proceedings 5th International Symposium on Autonomous Decentralized Systems, Dallas, TX, 2001, pp. 19-28.
Z. Hu, "The Study of E-Commerce Security Protocol," 2011 International Conference on Intelligence Science and Information Engineering, Wuhan, 2011, pp. 349-352.
Shen zihao and Wang hui, "An improved SET protocol payment system," 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering, Chengdu, 2010, pp. 400-403.
B. Xu and S. Xie, "Research of Session Security Management in E-Commerce System," 2009 International Symposium on Information Engineering and Electronic Commerce, Ternopil, 2009, pp. 796-799.
Z. Zhang, "E-Commerce Based Agents over P2P Network," 2008 International Conference on Management of e-Commerce and e-Government, Jiangxi, 2008, pp. 77-81.
Chin-Ming Hsu and Hui-Mei Chao, "An online fraud-resistant technology for credit card E-transactions," TENCON 2007 - 2007 IEEE Region 10 Conference, Taipei, 2007, pp. 1-4.
P. Venkataram, B. S. Babu, M. K. Naveen and G. H. S. Gungal, "A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce," 2007 IEEE International Performance, Computing, and Communications Conference, New Orleans, LA, 2007, pp. 395-401.
Hyun-Seok Kim, Il-Gon Kim and Jin-Young Choi, "Analyzing the Application of E-Commerce inWireless Network," Second IEEE International Workshop on Mobile Commerce and Services, Munich, 2005, pp. 112-122.
H. Schuldt, A. Popovici and H. J. Schek, "Automatic generation of reliable e-commerce payment processes," Proceedings of the First International Conference on Web Information Systems Engineering, Hong Kong, 2000, pp. 434-441 vol.1.
Ramkrishna Oruganti, Saurabh Shah, Yohan Pavri, Neelansh Prasad, Prathamesh Churi (2017). JSSecure: A Secured Encryption Strategy for Payment Gateways in E-Commerce. Circulation in Computer Science, 2, 5(June 2017), 13-17.
Meadows, Catherine, and Paul Syverson. "A formal specification of requirements for payment transactions in the SET protocol." In International Conference on Financial Cryptography, pp. 122-140. Springer, Berlin, Heidelberg, 1998.
Lu, Shiyong, and Scott A. Smolka. "Model checking the secure electronic transaction (SET) protocol." In Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 1999. Proceedings. 7th International Symposium on, pp. 358-364. IEEE, 1999.
Brlek, Srecko, Sardaouna Hamadou, and John Mullins. "A flaw in the electronic commerce protocol SET." Information Processing Letters 97, no. 3 (2006): 104-108.
Shedid, Sabrina M., and Mohamed Kouta. "Modified SET protocol for mobile payment: an empirical analysis." In Software Technology and Engineering (ICSTE), 2010 2nd International Conference on, vol. 1, pp. V1-350. IEEE, 2010.
Paulson, Lawrence C. "Verifying the SET protocol: Overview." In Formal Aspects of Security, pp. 4-14. Springer, Berlin, Heidelberg, 2003.
Seo, Moonseog, and Kwangjo Kim. "Electronic funds transfer protocol using domain-verifiable signcryption scheme." In ICISC, vol. 99, pp. 269-277. 1999.
Seo, Moonseog, and Kwangjo Kim. "Electronic funds transfer protocol using domain-verifiable signcryption scheme." In ICISC, vol. 99, pp. 269-277. 1999.
Kraft, Theresa A., and Ratika Kakar. "E-commerce security." In Proceedings of the Conference on Information Systems Applied Research, Washington DC, USA. 2009.
Marchany, Randy C., and Joseph G. Tront. "E-commerce security issues." In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, pp. 2500-2508. IEEE, 2002.
Udo, Godwin J. "Privacy and security concerns as major barriers for e-commerce: a survey study." Information Management & Computer Security 9, no. 4 (2001): 165-174.
Marchany, Randy C., and Joseph G. Tront. "E-commerce security issues." In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, pp. 2500-2508. IEEE, 2002.
Kesh, Someswar, Sam Ramanujan, and Sridhar Nerur. "A framework for analyzing e-commerce security." Information Management & Computer Security 10, no. 4 (2002): 149-158.
Laudon, Kenneth C., and Carol Guercio Traver. E-commerce. Pearson, 2013.
Sengupta, A., C. Mazumdar, and M. S. Barik. "e-Commerce security—A life cycle approach." Sadhana 30, no. 2 (2005): 119-140.
Mastercard and Visa. SET Protocol Specifications. http://www.setco.org/set_specifications.html
Romao A. and da Silva M. M., 1998. An Agent-based Secure Internet Payment Systems. Proceedings of TREC’98, LNCS 1402, pp. 80-93.
Wang X. F. et al, 1999, “Secure Agent-Mediated Mobile Payment†Proceedings of PRIMA98, LNAI 1599, pp.162- 173.
Supakorn Kungpisdan , Bala Srinivasan , Phu Dung Le, “A Practical Framework for Mobile SET Payment†In Proceedings of the IADIS International E-Society Conference, Lisbon, Portugal, June 3-6 (2003) , pp 321-328
Chung-Ming Ou, C.R.Ou, “SETNR/A: an agent-based secure payment protocol for mobile commerceâ€, International Journal of Intelligent Information and Database Systems, Vol. 4, No.3, 2010.
Xiaolin Pang, Kian–Lee Tan, Yan Wang, and Jian Ren, “A Secure Agent-Mediated Payment Protocolâ€, In: Fourth International Conference on Information and Communications Security (ICICS2002), volume LNCS 2512, Springer-Verlag, pages 422-433