<P><FONT face=Tahoma>The E–commerce gives work and the life of people to bring the new commerce moment with facilitating,<BR>but also is being faced with jumbo challenge. Because an important technology characteristic <BR>of E_commerce is using IT′s technology to come to transmit and deals with commerce information.<BR>Therefore in fact computer network safety is closed with commercial affairs business safety,<BR>they couldn′t be divided, both supplement and complement each other, and are integral. Not <BR>having computer network safety as the foundation, commercial affairs business safety is just as <BR>the castles in the air, and does not have no way to talk. The safety is one of the huge challenges<BR>that the E‐commerce is faced with, and it becomes hindrance follow‐on bottle neck of <BR>E_commerce. The commercial affairs businesses all will not be carried on by way of the cross‐domain <BR>communication environment of a danger in any individual, enterprise or commerce organization,<BR>and can lead to so the various business information to be leaked or destroys, thus createthe<BR>jumbo interest to lose. The safety is the important guarantee of E‐commerce life‐force,<BR>and becomes again at the same time restricting one of follow‐on bottle of neck factor E‐commerce <BR>at present.</FONT></P> <P><B>Keywords:</B><FONT face=Tahoma> </FONT></P> <P><FONT face=Tahoma>�� E‐commerce <BR>�� Information Security <BR>�� Innovative E‐business models <BR>�� Access Control <BR>�� Mobile business <BR>�� Anti‐Virus and Anti‐Worms <BR>�� Business process integration <BR>�� Authentication and Authorization <BR>�� Business process re‐engineering <BR>�� Applied Cryptography <BR>�� E‐Marketplaces, E‐Hubs and portals <BR>�� Electronic Commerce Security <BR>�� Digital goods and products <BR>�� Distributed Systems Security <BR>�� User behavior modeling <BR>�� Database Security <BR>�� Inter‐organizational systems <BR>�� Information Hiding and Watermarking <BR>�� Key Management and Key Recovery <BR>�� E‐Commerce content management <BR>�� Operating System Security <BR>�� E‐Negotiations, auctioning and contracting <BR>�� Supply, demand, and value chains <BR>�� Trusted Computing <BR>�� Enterprise application integration <BR>�� Other topic </FONT><FONT face=Tahoma></FONT></P>
Abbrevation
ISECS
City
Guangzhou
Country
China
Deadline Paper
Start Date
End Date
Abstract