JOURNAL ARTICLE

Security Design for E-business Applications

Abstract

This paper introduces a security design for an e-business environment with the use of the three-layered e-business architecture. This security design proposes best practices in general. It involves different stages of the management process (planning, deployment, administration, and auditing) and security control by layers - from physical access, to network communication, to operating systems, to applications. Issues such as security management process analysis, control analysis, and cost-benefits analysis are also discussed.

Keywords:
Computer science Software deployment Security information and event management Security service Computer security Computer security model Audit Business process Process management Cloud computing security Information security Business Software engineering Engineering Work in process Operations management

Metrics

1
Cited By
0.79
FWCI (Field Weighted Citation Impact)
5
Refs
0.85
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Service-Oriented Architecture and Web Services
Physical Sciences →  Computer Science →  Information Systems
Access Control and Trust
Social Sciences →  Social Sciences →  Sociology and Political Science
Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.