Abbrevation
ISECS
City
Guangzhou
Country
China
Deadline Paper
Start Date
End Date
Abstract

<P><FONT face=Tahoma>The E&#8211;commerce gives work and the life of people to bring the new commerce moment with facilitating,<BR>but also is being faced with jumbo challenge&#046; Because an important technology characteristic <BR>of E_commerce is using IT&#8242;s technology to come to transmit and deals with commerce information&#046;<BR>Therefore in fact computer network safety is closed with commercial affairs business safety,<BR>they couldn&#8242;t be divided, both supplement and complement each other, and are integral&#046; Not <BR>having computer network safety as the foundation, commercial affairs business safety is just as <BR>the castles in the air, and does not have no way to talk&#046; The safety is one of the huge challenges<BR>that the E&#8208;commerce is faced with, and it becomes hindrance follow&#8208;on bottle neck of <BR>E_commerce&#046; The commercial affairs businesses all will not be carried on by way of the cross&#8208;domain <BR>communication environment of a danger in any individual, enterprise or commerce organization,<BR>and can lead to so the various business information to be leaked or destroys, thus createthe<BR>jumbo interest to lose&#046; The safety is the important guarantee of E&#8208;commerce life&#8208;force,<BR>and becomes again at the same time restricting one of follow&#8208;on bottle of neck factor E&#8208;commerce <BR>at present&#046;</FONT></P> <P><B>Keywords:</B><FONT face=Tahoma> </FONT></P> <P><FONT face=Tahoma>&#56256;&#56451; E&#8208;commerce <BR>&#56256;&#56451; Information Security <BR>&#56256;&#56451; Innovative E&#8208;business models <BR>&#56256;&#56451; Access Control <BR>&#56256;&#56451; Mobile business <BR>&#56256;&#56451; Anti&#8208;Virus and Anti&#8208;Worms <BR>&#56256;&#56451; Business process integration <BR>&#56256;&#56451; Authentication and Authorization <BR>&#56256;&#56451; Business process re&#8208;engineering <BR>&#56256;&#56451; Applied Cryptography <BR>&#56256;&#56451; E&#8208;Marketplaces, E&#8208;Hubs and portals <BR>&#56256;&#56451; Electronic Commerce Security <BR>&#56256;&#56451; Digital goods and products <BR>&#56256;&#56451; Distributed Systems Security <BR>&#56256;&#56451; User behavior modeling <BR>&#56256;&#56451; Database Security <BR>&#56256;&#56451; Inter&#8208;organizational systems <BR>&#56256;&#56451; Information Hiding and Watermarking <BR>&#56256;&#56451; Key Management and Key Recovery <BR>&#56256;&#56451; E&#8208;Commerce content management <BR>&#56256;&#56451; Operating System Security <BR>&#56256;&#56451; E&#8208;Negotiations, auctioning and contracting <BR>&#56256;&#56451; Supply, demand, and value chains <BR>&#56256;&#56451; Trusted Computing <BR>&#56256;&#56451; Enterprise application integration <BR>&#56256;&#56451; Other topic </FONT><FONT face=Tahoma></FONT></P>