Antecedents of Security Pillars in E-Commerce Applications.
Amin A. ShaqrahPublished in: Int. J. Bus. Data Commun. Netw. (2011)
Keyphrases
- security issues
- information security
- access control
- personal information
- computer security
- security threats
- security problems
- information assurance
- security requirements
- neural network
- security management
- network security
- statistical databases
- encryption scheme
- high security
- security measures
- security level
- elliptic curve
- cyber security
- key management
- functional requirements
- intrusion detection
- case study