{"title":"电子商务系统安全评价模型分析","authors":"Xiaohong Zhang, Huiqin Wang, Bo He","doi":"10.1109/FITME.2010.5654805","DOIUrl":null,"url":null,"abstract":"The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers based on TCP/IP protocol and introduces the security technologies in each layer; and then designs the security evaluation model of EC system bases on the analytic hierarchy process(AHP), which includes the evaluation layer(A), four main factors(B1 to B4) and 12 sub-factors(C1 to C12). Thirdly this paper establishes the assessment matrixes of A-B and B-C and check their consistency to get the assessment matrixes of A-C. In addition, this paper calculates the total evaluation coefficient of three EC systems and the best one was choosed. At last, the conclusion is that the model of EC security can get the satisfied result of evaluation using AHP.","PeriodicalId":421597,"journal":{"name":"2010 International Conference on Future Information Technology and Management Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of E-commerce system security evaluation model\",\"authors\":\"Xiaohong Zhang, Huiqin Wang, Bo He\",\"doi\":\"10.1109/FITME.2010.5654805\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers based on TCP/IP protocol and introduces the security technologies in each layer; and then designs the security evaluation model of EC system bases on the analytic hierarchy process(AHP), which includes the evaluation layer(A), four main factors(B1 to B4) and 12 sub-factors(C1 to C12). Thirdly this paper establishes the assessment matrixes of A-B and B-C and check their consistency to get the assessment matrixes of A-C. In addition, this paper calculates the total evaluation coefficient of three EC systems and the best one was choosed. At last, the conclusion is that the model of EC security can get the satisfied result of evaluation using AHP.\",\"PeriodicalId\":421597,\"journal\":{\"name\":\"2010 International Conference on Future Information Technology and Management Engineering\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Future Information Technology and Management Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FITME.2010.5654805\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Future Information Technology and Management Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FITME.2010.5654805","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of E-commerce system security evaluation model
The evaluation of EC security often copies the standard of information security, the effect of evaluation is rough and partial. This paper firstly constructs the security frame of EC system, which includes five layers based on TCP/IP protocol and introduces the security technologies in each layer; and then designs the security evaluation model of EC system bases on the analytic hierarchy process(AHP), which includes the evaluation layer(A), four main factors(B1 to B4) and 12 sub-factors(C1 to C12). Thirdly this paper establishes the assessment matrixes of A-B and B-C and check their consistency to get the assessment matrixes of A-C. In addition, this paper calculates the total evaluation coefficient of three EC systems and the best one was choosed. At last, the conclusion is that the model of EC security can get the satisfied result of evaluation using AHP.