Font Size: a A A

The Design With Realization On The Security Middleware Of E-Commerce

Posted on:2008-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:L MaFull Text:PDF
GTID:2178360242964940Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the pervasive use of web applications, E-Commerce has been widely accepted. As for the constrains of security, the security problem of E-Commerce has been the key issue of E-Commerce system development. As the middleware technology has been widely used in the E-Commerce system development, based on middleware thoughts, this paper adopts secure middleware to solve the bottom security problems in E-Commerce Developing process. Secure middleware provides a secure infrastructure for E-commerce development, and masks the complexity of security technology.First, this paper illustrates the developing history of E-Commerce, and fully analyses the security problems of E-Commerce. From macroscopical view, this paper introduces the background of the emergence of E-Commerce system, current status and developing trends, and then gets the whole view of the security problems of E-Commerce systems.This paper then analyses the function and meaning of the using of middleware in software development, and introduces them according to category. This paper proposes to solve the repeat development problems in development of E-Commerce systems using security middleware.Analyses the characteristics and structure of common secure middleware CDSA(Common Data Security Architecture), explains the key parts of CDSA-the design and implementation of Secure Service Provider and Certificate Service Provider. In CSSM, API interface implementation, working procedures of CSSM and management of SSP module is discussed.The secure service re-composition in CSSM is a Multi-Objective Problem. This paper introduces a genetic-particle swarm algorithm GAPSO to solve the MOP, and the experiments prove the feasibility and superiority of the GAPSO.The secure middleware in this paper tries to achieve the goal of common use and security at the same time.
Keywords/Search Tags:E-Commerce, Secure Middleware, Secure Service Re-composition, Genetic Algorithm-Particle Swarm Optimization
PDF Full Text Request
Related items