Web security & commerce
Computer security
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
A lattice model of secure information flow
Communications of the ACM
Time Sharing Computer Systems
Network Security: The Complete Reference
Network Security: The Complete Reference
Security Requirements of E-Business Processes
I3E '01 Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E-Business, E-Government
Professional Pen Testing for Web Applications (Programmer to Programmer)
Professional Pen Testing for Web Applications (Programmer to Programmer)
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The Internet appears to be a very significant driver in changing business environment and in business models changes as well. More and more organisations perform that change from traditional business to e-business mode, while being exposed to a wide range of vulnerabilities and threats. This paper presents a model for e-business information security design, that is based on a process-based security paradigm. The model, as well as the paradigm on which it is based, are an alternative for the existing perimeter security paradigm, which is no more relevant for an e-business organisation.