电子商务安全策略研究
发布时间:2018-11-14 08:34
【摘要】: 随着互联网的不断发展,在世界范围内掀起了一股电子商务热潮。许多国家政府部门对电子商务的发展十分重视,把这场以电子商务为标志的信息化革命与十九世纪以蒸汽机为标志的工业化革命相提并论,并纷纷出台了有关政策和举措。电子商务正得到越来越广泛的应用。其发展给人类社会带来巨大的影响,其一系列的相关领域的研究成为全球的热点。但近年来,电子商务的发展逐步放慢了脚步,其安全问题是阻碍发展的主要原因之一。所以本人选择这一课题进行了探索性研究,有着重要的实际意义。 论文第一章介绍课题的研究背景,总结国内外电子商务安全研究现状及我国电子商务安全存在的问题和该问题研究的发展趋势。论文第二章对电子商务安全的内容做了简要的概述,提出电子商务安全的五个方面的需求:信息的保密性,信息的完整,信息的真实性,信息的不可抵赖性,信息的有效性。并对电子商务信息安全面临的威胁进行了描述。接下来论述了电子商务的安全技术机制,利用分层模型将各安全措施映射到对应层次中进行了四个方面的论述,其中包括网络层技术,加密层技术,认证层技术,协议层技术。在论述了电子商务系统的安全机制的基础上,提出电子商务系统安全技术的架构。论文还在第三章论述电子商务安全评价方法,介绍国内外电子商务系统的安全评价标准,设计电子商务安全评价的指标,提出对电子商务安全进行评价的一种可行性方法一模糊综合评价法。此后论文在第四章介绍电子商务交易支付系统模型,并设计了一个基于SET协议的交易模型。第五章对电子商务信息安全认证进行了论述。最后一章对电子商务企业安全在技术和管理以及第三方外包服务进行了全面的分析。论文结尾提出了电子商务的正确安全观念,并进一步指出解决电子商务安全问题尚需努力的方向。
[Abstract]:With the continuous development of the Internet, there is a wave of electronic commerce upsurge all over the world. Many government departments in many countries attach great importance to the development of electronic commerce, equating the information revolution marked by electronic commerce with the industrialization revolution marked by steam engine in the 19th century, and has issued relevant policies and measures one after another. E-commerce is getting more and more extensive application. Its development has brought great influence to human society, and a series of related research has become a global hot spot. However, in recent years, the development of electronic commerce has slowed down gradually, and its security is one of the main reasons that hinder the development. Therefore, I choose this subject for exploratory research, which has important practical significance. The first chapter introduces the research background of the subject, summarizes the domestic and foreign e-commerce security research status, the existing problems of e-commerce security in China and the development trend of this issue. The second chapter gives a brief overview of the content of electronic commerce security, and puts forward five requirements of electronic commerce security: the confidentiality of information, the integrity of information, the authenticity of information, the non-repudiation of information, and the validity of information. The paper also describes the threats to the information security of e-commerce. Then it discusses the security technology mechanism of electronic commerce, and uses the layered model to map the security measures to the corresponding level, including network layer technology, encryption layer technology, authentication layer technology, protocol layer technology. On the basis of discussing the security mechanism of e-commerce system, the structure of e-commerce system security technology is put forward. In the third chapter, the paper also discusses the security evaluation methods of electronic commerce, introduces the security evaluation standards of domestic and foreign electronic commerce systems, and designs the indexes of security evaluation of electronic commerce. The fuzzy comprehensive evaluation method, a feasible method for evaluating the security of electronic commerce, is put forward. In the fourth chapter, the paper introduces the electronic commerce transaction payment system model, and designs a transaction model based on SET protocol. Chapter five discusses the authentication of e-commerce information security. The last chapter analyzes the security of e-business enterprises in technology and management as well as third-party outsourcing services. At the end of this paper, the correct security concept of e-commerce is put forward, and the direction to solve the security problem of e-commerce is pointed out.
【学位授予单位】:北京邮电大学
【学位级别】:硕士
【学位授予年份】:2008
【分类号】:TP393.08
本文编号:2330668
[Abstract]:With the continuous development of the Internet, there is a wave of electronic commerce upsurge all over the world. Many government departments in many countries attach great importance to the development of electronic commerce, equating the information revolution marked by electronic commerce with the industrialization revolution marked by steam engine in the 19th century, and has issued relevant policies and measures one after another. E-commerce is getting more and more extensive application. Its development has brought great influence to human society, and a series of related research has become a global hot spot. However, in recent years, the development of electronic commerce has slowed down gradually, and its security is one of the main reasons that hinder the development. Therefore, I choose this subject for exploratory research, which has important practical significance. The first chapter introduces the research background of the subject, summarizes the domestic and foreign e-commerce security research status, the existing problems of e-commerce security in China and the development trend of this issue. The second chapter gives a brief overview of the content of electronic commerce security, and puts forward five requirements of electronic commerce security: the confidentiality of information, the integrity of information, the authenticity of information, the non-repudiation of information, and the validity of information. The paper also describes the threats to the information security of e-commerce. Then it discusses the security technology mechanism of electronic commerce, and uses the layered model to map the security measures to the corresponding level, including network layer technology, encryption layer technology, authentication layer technology, protocol layer technology. On the basis of discussing the security mechanism of e-commerce system, the structure of e-commerce system security technology is put forward. In the third chapter, the paper also discusses the security evaluation methods of electronic commerce, introduces the security evaluation standards of domestic and foreign electronic commerce systems, and designs the indexes of security evaluation of electronic commerce. The fuzzy comprehensive evaluation method, a feasible method for evaluating the security of electronic commerce, is put forward. In the fourth chapter, the paper introduces the electronic commerce transaction payment system model, and designs a transaction model based on SET protocol. Chapter five discusses the authentication of e-commerce information security. The last chapter analyzes the security of e-business enterprises in technology and management as well as third-party outsourcing services. At the end of this paper, the correct security concept of e-commerce is put forward, and the direction to solve the security problem of e-commerce is pointed out.
【学位授予单位】:北京邮电大学
【学位级别】:硕士
【学位授予年份】:2008
【分类号】:TP393.08
【引证文献】
相关期刊论文 前2条
1 吴昊;杜新宇;吉利民;;浅析电子商务安全发展现状与技术策略[J];计算机光盘软件与应用;2012年20期
2 覃如贤;;电子商务的安全协议分析[J];网络安全技术与应用;2011年03期
相关硕士学位论文 前2条
1 林青;数字水印技术及其在电子商务安全中的应用研究[D];电子科技大学;2009年
2 孙有伟;中小型企业电子商务网站开发及安全实现[D];南京大学;2012年
,本文编号:2330668
本文链接:https://www.wllwen.com/jingjilunwen/dianzishangwulunwen/2330668.html