z-logo
open-access-imgOpen Access
Simulation analysis of protected B2B e-commerce processes
Author(s) -
Zoran Živković,
Milorad J. Stanojević
Publication year - 2006
Publication title -
computer science and information systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.244
H-Index - 24
eISSN - 2406-1018
pISSN - 1820-0214
DOI - 10.2298/csis0601077z
Subject(s) - computer science , public key infrastructure , public key certificate , digital signature , interoperability , computer security , cryptography , e commerce , certificate , architecture , the internet , certificate authority , public key cryptography , world wide web , theoretical computer science , encryption , hash function , art , visual arts
In this paper a simulation analysis of certain trust models (complex PKI architectures) with regard to the security support of B2B applications on the Internet is presented. The objective of such an analysis has been the choice of the most efficient PKI architecture and a solution of the cryptographic interoperability problem. A simulation model of protected B2B e-commerce has also been presented, based on the chosen PKI architecture. This paper has shown the significance of the up-to-date cryptographic mechanisms: digital signature and digital certificate to deliver the main security services based on PKI.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom