Ahmed Aloui, O. Kazar, Samir Bourekkache, Merouane Zoubeidi
{"title":"Security study of m-business: Review and important solutions","authors":"Ahmed Aloui, O. Kazar, Samir Bourekkache, Merouane Zoubeidi","doi":"10.1109/ISEI.2015.7358729","DOIUrl":null,"url":null,"abstract":"In our previous work [1], we proposed a mobile business approach based on mobile agent. Dealing with the same subject, we treat the security aspects of m-business. The security is considered as a major importance in the electronic world, and the security became a key factor for the success of the mobile activity. The success of m-business will depend on the security strategy end-to-end which minimizes the risks at an acceptable level for companies and users. In this article, we propose the requirements of security (the challenges), the attenuation strategies (possible solutions) and the stages of the security of m-business architecture.","PeriodicalId":115266,"journal":{"name":"2015 6th International Conference on Information Systems and Economic Intelligence (SIIE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 6th International Conference on Information Systems and Economic Intelligence (SIIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEI.2015.7358729","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In our previous work [1], we proposed a mobile business approach based on mobile agent. Dealing with the same subject, we treat the security aspects of m-business. The security is considered as a major importance in the electronic world, and the security became a key factor for the success of the mobile activity. The success of m-business will depend on the security strategy end-to-end which minimizes the risks at an acceptable level for companies and users. In this article, we propose the requirements of security (the challenges), the attenuation strategies (possible solutions) and the stages of the security of m-business architecture.