Developing Security Enabled Applications for Web Commerce

Developing Security Enabled Applications for Web Commerce

Copyright: © 2016 |Pages: 13
ISBN13: 9781522502739|ISBN10: 1522502734|EISBN13: 9781522502746
DOI: 10.4018/978-1-5225-0273-9.ch010
Cite Chapter Cite Chapter

MLA

Balasubramanian, Kannan. "Developing Security Enabled Applications for Web Commerce." Cryptographic Solutions for Secure Online Banking and Commerce, edited by Kannan Balasubramanian, et al., IGI Global, 2016, pp. 161-173. https://doi.org/10.4018/978-1-5225-0273-9.ch010

APA

Balasubramanian, K. (2016). Developing Security Enabled Applications for Web Commerce. In K. Balasubramanian, K. Mala, & M. Rajakani (Eds.), Cryptographic Solutions for Secure Online Banking and Commerce (pp. 161-173). IGI Global. https://doi.org/10.4018/978-1-5225-0273-9.ch010

Chicago

Balasubramanian, Kannan. "Developing Security Enabled Applications for Web Commerce." In Cryptographic Solutions for Secure Online Banking and Commerce, edited by Kannan Balasubramanian, K. Mala, and M. Rajakani, 161-173. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0273-9.ch010

Export Reference

Mendeley
Favorite

Abstract

As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to attack. Today it is the norm to visit Web sites where logins and passwords are required to navigate from one section of the site to another. This is much more so required in a Web application where data is being manipulated between secure internal networks and the Internet. Web applications, no matter what their functions are, should not exchange data over the Internet unless it is encrypted or at least digitally signed. Security should be extended to the private-public network borders to provide the same authentication, access control, and accounting services that local area network (LAN) based applications employ. The most widely used method of Web application security today is Private Key Infrastructure (PKI). Various examples of PKI implementations are examined.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.