By Topic

The Model of Trusted Computing for Online Payment of B2C E-Business Website Based on Trusted Third Party

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Shaohua Qiang ; Coll. of Manage. Sci. & Eng., Nanjing Univ. of Technol., Nanjing, China ; Yiman Zhen ; Jinxia Cai

The system of trusted third party(TTP) is the main trust technology for online-payment of B2C e-business, but it is not sufficient to support the trusted security in a world of virtual and widely distributed organizations .It needs to safeguard the security and durative of service based on the demands of users. So we need to protect confidentiality of user , maintain integrity of bargaining data, assure availability of every deal. The model of trusted computing for online payment of B2C e-business Web site based on TTP can offer the unified identity authentication and access control .Based on the framework of PKI ,the model of trusted network connection (TNC) can resolve the identity authentication of terminal, the model of temp security domain (TSD) can resolve the identity authentication of website transfer, the model of trusted access control based PMI/RBAC can support agile privilege and role management based on e-business domain knowledge .

Published in:

Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on

Date of Conference:

11-13 Dec. 2009