Analysis of Existing Privacy-aware Access Control for E-Commerce Application

α
Dr. Norjihan Abdul Ghani
Dr. Norjihan Abdul Ghani
σ
Harihodin Selamat
Harihodin Selamat
ρ
Zailani Mohamed Sidek
Zailani Mohamed Sidek
α National University of Singapore National University of Singapore

Send Message

To: Author

Analysis of Existing Privacy-aware Access Control for E-Commerce Application

Article Fingerprint

ReserarchID

NX44Z

Analysis of Existing Privacy-aware Access Control for E-Commerce Application Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Due to the growing use of the internet, more and more critical processes are running over the web such as e-commerce. Internet allows commerce and business between parties who are physically distant and do not know each other doing the transaction. For the effective operation of the web application and ecommerce applications, security is a key issue. Various aspects of security are relevant to e-commerce such as database security. The availability of e-commerce, user transactions are no longer bound to traditional office-centered environment, but it can be started virtually anywhere at any time. It was moving from closed environment to open environment. In this paper, we clearly define the privacy-aware access control requirements. We also investigated few existing access control in the context of this requirements. We build an assessment criteria in our comparison based on the requirements defined which we finally used it later as a guidelines to design an access control for e-commerce application.

References

16 Cites in Article
  1. R Agrawal,J Kiernan,R Srikant (2002). Hippocratic Database.
  2. Steve Barker (2010). Personalizing access control by generalizing access control.
  3. E Bertino,R Sandhu (2005). Database Security -Concepts, Approaches, and Challenges.
  4. Stefan Brands (2000). Rethinking Public Key Infrastructures and Digital Certificates.
  5. J Byun,E Bertino,N Li (2005). Purpose based access control of complex data for privacy protection.
  6. Ji-Won Byun,Ninghui Li (2008). Purpose based access control for privacy protection in relational database systems.
  7. S Chauduri,R Kaushik,R Ramamurthy (2011). Database Access Control & Privacy: Is there a Commom Ground? 5 th Biennial Conference on Innovative Data Systems Research.
  8. K Lefevre,R Agrawal,V Ercegovac,R Ramakrishnan,Y Xu,D Dewitt (2004). Limiting Disclosure in Hippocratic Databases.
  9. Q Ni,A Trombetta,E Bertino,J Lobo (2007). Privacy-aware role based access control.
  10. Mary Thompson,Abdelilah Essiari,Srilekha Mudumbai (2003). Certificate-based authorization policy in a PKI environment.
  11. D Nirmal,V Ruchi (2009). Access Control Methodology For Sharing Of Open And Domain Confined Data Using Standard Credentials.
  12. V Samarati (2001). Access control: Policies, models, and mechanisms.
  13. A Wasim,Al-Hamdani (2010). Cryptography based access control in healthcare web systems.
  14. A Westin (1967). Privacy and Freedom.
  15. William Johnston,Srilekha Mudumbai,Mary Thompson (1998). Authorization and Attribute Certificates for widely Distributed Access Control‖.
  16. Naikuo Yang,Howard Barringer,Ning Zhang (2008). A Purpose-Based Access Control Model.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Dr. Norjihan Abdul Ghani. 1970. \u201cAnalysis of Existing Privacy-aware Access Control for E-Commerce Application\u201d. Unknown Journal GJCST Volume 12 (GJCST Volume 12 Issue 4): .

Download Citation

Journal Specifications
Version of record

v1.2

Issue date

February 29, 2012

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 20520
Total Downloads: 11042
2026 Trends
Related Research

Published Article

Due to the growing use of the internet, more and more critical processes are running over the web such as e-commerce. Internet allows commerce and business between parties who are physically distant and do not know each other doing the transaction. For the effective operation of the web application and ecommerce applications, security is a key issue. Various aspects of security are relevant to e-commerce such as database security. The availability of e-commerce, user transactions are no longer bound to traditional office-centered environment, but it can be started virtually anywhere at any time. It was moving from closed environment to open environment. In this paper, we clearly define the privacy-aware access control requirements. We also investigated few existing access control in the context of this requirements. We build an assessment criteria in our comparison based on the requirements defined which we finally used it later as a guidelines to design an access control for e-commerce application.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Analysis of Existing Privacy-aware Access Control for E-Commerce Application

Dr. Norjihan Abdul Ghani
Dr. Norjihan Abdul Ghani National University of Singapore
Harihodin Selamat
Harihodin Selamat
Zailani Mohamed Sidek
Zailani Mohamed Sidek

Research Journals