Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

E‐security

E‐security Suggests that there are four principal security functions for commercial transactions: confidentiality; integrity; authentication; and non-repudiation. States the conduction of business has been changed by the Internet. Discusses the need for electronic business security technology, physical as well as electronic. Highlights various forms of security as: different links; encryption; digital signatures; public key infrastructure; smart cards and smart buttons; and identification. Sums up that no data security system is impenetrable and the main vulnerabilities are: secret key compromise; public key tampering; viruses; direct cryptanalysis; or old-fashioned physical security breaches. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png The Antidote Emerald Publishing

E‐security

The Antidote , Volume 5 (1): 2 – Feb 1, 2000

Loading next page...
 
/lp/emerald-publishing/e-security-KUMidf0fI8
Publisher
Emerald Publishing
Copyright
Copyright © 2000 MCB UP Ltd. All rights reserved.
ISSN
1363-8483
DOI
10.1108/EUM0000000006742
Publisher site
See Article on Publisher Site

Abstract

Suggests that there are four principal security functions for commercial transactions: confidentiality; integrity; authentication; and non-repudiation. States the conduction of business has been changed by the Internet. Discusses the need for electronic business security technology, physical as well as electronic. Highlights various forms of security as: different links; encryption; digital signatures; public key infrastructure; smart cards and smart buttons; and identification. Sums up that no data security system is impenetrable and the main vulnerabilities are: secret key compromise; public key tampering; viruses; direct cryptanalysis; or old-fashioned physical security breaches.

Journal

The AntidoteEmerald Publishing

Published: Feb 1, 2000

Keywords: Security; Security products; Commercial property

There are no references for this article.