Analysis of E-commerce system security evaluation model

Xiaohong Zhang, Huiqin Wang, Bo He
{"title":"Analysis of E-commerce system security evaluation model","authors":"Xiaohong Zhang, Huiqin Wang, Bo He","doi":"10.1109/FITME.2010.5654805","DOIUrl":null,"url":null,"abstract":"The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers based on TCP/IP protocol and introduces the security technologies in each layer; and then designs the security evaluation model of EC system bases on the analytic hierarchy process(AHP), which includes the evaluation layer(A), four main factors(B1 to B4) and 12 sub-factors(C1 to C12). Thirdly this paper establishes the assessment matrixes of A-B and B-C and check their consistency to get the assessment matrixes of A-C. In addition, this paper calculates the total evaluation coefficient of three EC systems and the best one was choosed. At last, the conclusion is that the model of EC security can get the satisfied result of evaluation using AHP.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Future Information Technology and Management Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FITME.2010.5654805","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers based on TCP/IP protocol and introduces the security technologies in each layer; and then designs the security evaluation model of EC system bases on the analytic hierarchy process(AHP), which includes the evaluation layer(A), four main factors(B1 to B4) and 12 sub-factors(C1 to C12). Thirdly this paper establishes the assessment matrixes of A-B and B-C and check their consistency to get the assessment matrixes of A-C. In addition, this paper calculates the total evaluation coefficient of three EC systems and the best one was choosed. At last, the conclusion is that the model of EC security can get the satisfied result of evaluation using AHP.
电子商务系统安全评价模型分析
电子商务安全评价往往照搬信息安全标准,评价效果粗糙、不全面。本文首先构建了基于TCP/IP协议的电子商务系统的安全框架,该框架包括五层,并介绍了各层的安全技术;然后基于层次分析法(AHP)设计了电子商务系统安全评价模型,该模型包括评价层(A)、4个主因子(B1 ~ B4)和12个子因子(C1 ~ C12)。再次,建立了A-B和B-C的评价矩阵,并对其一致性进行检验,得到了A-C的评价矩阵。此外,本文还计算了三种EC系统的总评价系数,并选出了最佳的EC系统。最后得出的结论是,采用层次分析法对电子商务的安全性进行评价,可以得到满意的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信