Reference Hub2
Policy-Based Security for M-Commerce Networks

Policy-Based Security for M-Commerce Networks

Wassim Itani
ISBN13: 9781599045580|ISBN10: 1599045583|ISBN13 Softcover: 9781616926359|EISBN13: 9781599045603
DOI: 10.4018/978-1-59904-558-0.ch004
Cite Chapter Cite Chapter

MLA

Itani, Wassim. "Policy-Based Security for M-Commerce Networks." Global Mobile Commerce: Strategies, Implementation and Case Studies, edited by Wayne Huang, et al., IGI Global, 2008, pp. 53-67. https://doi.org/10.4018/978-1-59904-558-0.ch004

APA

Itani, W. (2008). Policy-Based Security for M-Commerce Networks. In W. Huang, Y. Wang, & J. Day (Eds.), Global Mobile Commerce: Strategies, Implementation and Case Studies (pp. 53-67). IGI Global. https://doi.org/10.4018/978-1-59904-558-0.ch004

Chicago

Itani, Wassim. "Policy-Based Security for M-Commerce Networks." In Global Mobile Commerce: Strategies, Implementation and Case Studies, edited by Wayne Huang, Yingluo Wang, and John Day, 53-67. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-558-0.ch004

Export Reference

Mendeley
Favorite

Abstract

In this chapter we present an overview of a general policy-based security architecture for securing the confidentiality, authenticity, and integrity of enterprise m-commerce data. A policy-based architecture protects data based on content and sensitivity and highly surpasses the performance of bulk encryption protocols such as SSL and TLS by utilizing a customizable, policy-driven approach. This approach makes use of the structure of enterprise data objects (Web pages, relational database entities, directory hierarchies, log files, etc…) to provide flexible, multi-level, and fine-grained encryption and hashing methodologies. This makes policy-based security protocols a very efficient choice for operation in wireless m-commerce environments characterized by low-bandwidth networks and supporting limited-resource devices with low memory, battery, and processing power.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.