Developing Security Enabled Applications for Web Commerce

Developing Security Enabled Applications for Web Commerce

ISBN13: 9781522534228|ISBN10: 1522534229|EISBN13: 9781522534235
DOI: 10.4018/978-1-5225-3422-8.ch015
Cite Chapter Cite Chapter

MLA

Balasubramanian, Kannan. "Developing Security Enabled Applications for Web Commerce." Application Development and Design: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 384-396. https://doi.org/10.4018/978-1-5225-3422-8.ch015

APA

Balasubramanian, K. (2018). Developing Security Enabled Applications for Web Commerce. In I. Management Association (Ed.), Application Development and Design: Concepts, Methodologies, Tools, and Applications (pp. 384-396). IGI Global. https://doi.org/10.4018/978-1-5225-3422-8.ch015

Chicago

Balasubramanian, Kannan. "Developing Security Enabled Applications for Web Commerce." In Application Development and Design: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 384-396. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3422-8.ch015

Export Reference

Mendeley
Favorite

Abstract

As more and more applications find their way to the World Wide Web, security concerns have increased. Web applications are by nature somewhat public and therefore vulnerable to attack. Today it is the norm to visit Web sites where logins and passwords are required to navigate from one section of the site to another. This is much more so required in a Web application where data is being manipulated between secure internal networks and the Internet. Web applications, no matter what their functions are, should not exchange data over the Internet unless it is encrypted or at least digitally signed. Security should be extended to the private-public network borders to provide the same authentication, access control, and accounting services that local area network (LAN) based applications employ. The most widely used method of Web application security today is Private Key Infrastructure (PKI). Various examples of PKI implementations are examined.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.