Ahmed Aloui, O. Kazar, Samir Bourekkache, Merouane Zoubeidi
{"title":"移动商务的安全研究:回顾和重要解决方案","authors":"Ahmed Aloui, O. Kazar, Samir Bourekkache, Merouane Zoubeidi","doi":"10.1109/ISEI.2015.7358729","DOIUrl":null,"url":null,"abstract":"In our previous work [1], we proposed a mobile business approach based on mobile agent. Dealing with the same subject, we treat the security aspects of m-business. The security is considered as a major importance in the electronic world, and the security became a key factor for the success of the mobile activity. The success of m-business will depend on the security strategy end-to-end which minimizes the risks at an acceptable level for companies and users. In this article, we propose the requirements of security (the challenges), the attenuation strategies (possible solutions) and the stages of the security of m-business architecture.","PeriodicalId":115266,"journal":{"name":"2015 6th International Conference on Information Systems and Economic Intelligence (SIIE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security study of m-business: Review and important solutions\",\"authors\":\"Ahmed Aloui, O. Kazar, Samir Bourekkache, Merouane Zoubeidi\",\"doi\":\"10.1109/ISEI.2015.7358729\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In our previous work [1], we proposed a mobile business approach based on mobile agent. Dealing with the same subject, we treat the security aspects of m-business. The security is considered as a major importance in the electronic world, and the security became a key factor for the success of the mobile activity. The success of m-business will depend on the security strategy end-to-end which minimizes the risks at an acceptable level for companies and users. In this article, we propose the requirements of security (the challenges), the attenuation strategies (possible solutions) and the stages of the security of m-business architecture.\",\"PeriodicalId\":115266,\"journal\":{\"name\":\"2015 6th International Conference on Information Systems and Economic Intelligence (SIIE)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 6th International Conference on Information Systems and Economic Intelligence (SIIE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISEI.2015.7358729\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 6th International Conference on Information Systems and Economic Intelligence (SIIE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEI.2015.7358729","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security study of m-business: Review and important solutions
In our previous work [1], we proposed a mobile business approach based on mobile agent. Dealing with the same subject, we treat the security aspects of m-business. The security is considered as a major importance in the electronic world, and the security became a key factor for the success of the mobile activity. The success of m-business will depend on the security strategy end-to-end which minimizes the risks at an acceptable level for companies and users. In this article, we propose the requirements of security (the challenges), the attenuation strategies (possible solutions) and the stages of the security of m-business architecture.