Building a truster environment for e-business : a Malaysian perspective
Internet identify ‘security’ as a major concern for businesses. In general, the level of security in any network environment is closely linked to the level of trust assigned to a particular individual or organization within that environment. It is the trust element that is crucial in ensuring a secu...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universiti Utara Malaysia
2002
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/376/1/N.M._Din.pdf http://repo.uum.edu.my/376/ http://www.jict.uum.edu.my |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uum.repo.376 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.3762010-08-29T04:08:07Z http://repo.uum.edu.my/376/ Building a truster environment for e-business : a Malaysian perspective Din, M.N. Jamaluddin, M.Z. QA75 Electronic computers. Computer science Internet identify ‘security’ as a major concern for businesses. In general, the level of security in any network environment is closely linked to the level of trust assigned to a particular individual or organization within that environment. It is the trust element that is crucial in ensuring a secure environment. Besides physical security, security technology needs to be utilised to provide a trusted environment for e-business. Network security components for perimeter defense, i.e., Virtual Private Networks, firewalls and Intrusion Detection Systems, need to be complemented by security components at the applications and user level, e.g., authentication of user. ID or password security solution may be an option but now with the availability of legally binding digital certificates, security in e-business transactions can be further improved. Time and date stamping of e-business transactions are also of concern to prove at a later date that the transactions took place at the stipulated date and time. Digital certificates are part of a Public Key Infrastructure (PKI) scheme, which is an enabling technology for building a trusted epvironment. PIU comprise policies and procedures for establishing a secure method for exchanging information over a network environment. The Digital Signature Act 1997 (DSA 1997) facilitates the PKI implementation in Malaysia. Following the DSA 1997, Certification Authorities (CAs) were set up in Malaysia. This paper describes a trusted platform for spurring ebusiness and provides a Malaysian perspective of it. Universiti Utara Malaysia 2002 Article PeerReviewed application/pdf en http://repo.uum.edu.my/376/1/N.M._Din.pdf Din, M.N. and Jamaluddin, M.Z. (2002) Building a truster environment for e-business : a Malaysian perspective. Journal of ICT, 1 (1). pp. 33-44. ISSN 1675-414X http://www.jict.uum.edu.my |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Din, M.N. Jamaluddin, M.Z. Building a truster environment for e-business : a Malaysian perspective |
description |
Internet identify ‘security’ as a major concern for businesses. In general, the level of security in any network environment is closely linked to the level of trust assigned to a particular individual or organization within that environment. It is the trust element that is crucial in ensuring a secure environment. Besides physical security, security technology needs to be utilised to
provide a trusted environment for e-business. Network security components for perimeter defense, i.e., Virtual Private Networks, firewalls and Intrusion Detection Systems, need to be complemented by security components at the applications and user level, e.g., authentication of user. ID or password security solution may be an option but now with the availability of legally binding digital certificates, security in e-business transactions can be further improved. Time and date stamping of e-business transactions are also of concern to prove at a later
date that the transactions took place at the stipulated date and time. Digital certificates are part of a Public Key Infrastructure (PKI) scheme, which is an enabling technology for building a trusted epvironment. PIU comprise policies and procedures for establishing a secure method for exchanging information over a network environment. The Digital Signature Act 1997 (DSA 1997) facilitates the PKI implementation in Malaysia. Following the DSA 1997, Certification Authorities (CAs) were set up in Malaysia. This paper describes a trusted platform for spurring ebusiness and provides a Malaysian perspective of it.
|
format |
Article |
author |
Din, M.N. Jamaluddin, M.Z. |
author_facet |
Din, M.N. Jamaluddin, M.Z. |
author_sort |
Din, M.N. |
title |
Building a truster environment for e-business : a Malaysian perspective |
title_short |
Building a truster environment for e-business : a Malaysian perspective |
title_full |
Building a truster environment for e-business : a Malaysian perspective |
title_fullStr |
Building a truster environment for e-business : a Malaysian perspective |
title_full_unstemmed |
Building a truster environment for e-business : a Malaysian perspective |
title_sort |
building a truster environment for e-business : a malaysian perspective |
publisher |
Universiti Utara Malaysia |
publishDate |
2002 |
url |
http://repo.uum.edu.my/376/1/N.M._Din.pdf http://repo.uum.edu.my/376/ http://www.jict.uum.edu.my |
_version_ |
1644277778788384768 |
score |
13.211869 |