IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Policy-Based Security for M-Commerce Networks

Policy-Based Security for M-Commerce Networks
View Sample PDF
Author(s): Wassim Itani (American University of Beirut, Lebanon)
Copyright: 2008
Pages: 15
Source title: Global Mobile Commerce: Strategies, Implementation and Case Studies
Source Author(s)/Editor(s): Wayne Huang (Ohio University, USA), Yingluo Wang (Jiao-Tong University, China)and John Day (Ohio University, USA)
DOI: 10.4018/978-1-59904-558-0.ch004

Purchase

View Policy-Based Security for M-Commerce Networks on the publisher's website for pricing and purchasing information.

Abstract

In this chapter we present an overview of a general policy-based security architecture for securing the confidentiality, authenticity, and integrity of enterprise m-commerce data. A policy-based architecture protects data based on content and sensitivity and highly surpasses the performance of bulk encryption protocols such as SSL and TLS by utilizing a customizable, policy-driven approach. This approach makes use of the structure of enterprise data objects (Web pages, relational database entities, directory hierarchies, log files, etc…) to provide flexible, multi-level, and fine-grained encryption and hashing methodologies. This makes policy-based security protocols a very efficient choice for operation in wireless m-commerce environments characterized by low-bandwidth networks and supporting limited-resource devices with low memory, battery, and processing power.

Related Content

Simriti Popli, Gabriel Wasswa. © 2024. 12 pages.
Pooja Lekhi. © 2024. 8 pages.
Shailey Singh. © 2024. 12 pages.
Shailey Singh. © 2024. 9 pages.
Tanuj Surve, Tuan Nguyen. © 2024. 17 pages.
Pawan Kumar, Sanjay Taneja, Mukul Bhatnagar, Arvinder K. Kaur. © 2024. 17 pages.
Azadeh Eskandarzadeh. © 2024. 15 pages.
Body Bottom