The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Policy-Based Security for M-Commerce Networks
Abstract
In this chapter we present an overview of a general policy-based security architecture for securing the confidentiality, authenticity, and integrity of enterprise m-commerce data. A policy-based architecture protects data based on content and sensitivity and highly surpasses the performance of bulk encryption protocols such as SSL and TLS by utilizing a customizable, policy-driven approach. This approach makes use of the structure of enterprise data objects (Web pages, relational database entities, directory hierarchies, log files, etc…) to provide flexible, multi-level, and fine-grained encryption and hashing methodologies. This makes policy-based security protocols a very efficient choice for operation in wireless m-commerce environments characterized by low-bandwidth networks and supporting limited-resource devices with low memory, battery, and processing power.
Related Content
Simriti Popli, Gabriel Wasswa.
© 2024.
12 pages.
|
Pooja Lekhi.
© 2024.
8 pages.
|
Shailey Singh.
© 2024.
12 pages.
|
Shailey Singh.
© 2024.
9 pages.
|
Tanuj Surve, Tuan Nguyen.
© 2024.
17 pages.
|
Pawan Kumar, Sanjay Taneja, Mukul Bhatnagar, Arvinder K. Kaur.
© 2024.
17 pages.
|
Azadeh Eskandarzadeh.
© 2024.
15 pages.
|
|
|