E-Profile-based Security for Critical Transactions in Web Applications Written by: Jean Stephan et al., 2009 Reported by: Renato Casipe, 2/15/2010.

Slides:



Advertisements
Similar presentations
FINANCIAL AUDIT METHODOLOGY PETER CARLILL UK NATIONAL AUDIT OFFICE.
Advertisements

P RIVACY, T RUST, AND R EPUTATION Jose Miguel Such July 27th, 2011.
Secure Communication Architectures.
Supply Chain Management
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
1 Software Testing and Quality Assurance Lecture 33 – Software Quality Assurance.
Usability Evaluation Based on Web Design Perspective Paper Written by: Conte et. al., 2007 Reported by: Renato Casipe.
June 11-13, 2003Michael Weiss, FIW 031 Feature Interactions in Web Services Michael Weiss Carleton University.
Outline IS400: Development of Business Applications on the Internet Fall 2004 Instructor: Dr. Boris Jukic Web Applications for Business: Performance Issues.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
CEET Conference 2008 Is Quality Assurance Improving? Rob Fearnside, Deputy Director VRQA.
Company LOGO B2C E-commerce Web Site Quality: an Empirical Examination (Cao, et al) Article overview presented by: Karen Bray Emilie Martin Trung (John)
Net Trust Alla Genkina, Indiana University Allan Friedman, Harvard University Jean Camp, Indiana University TIPPI Workshop June 13, 2005.
Chapter 2 Planning, Implementing, and Controlling Marketing Strategies.
Cloud Usability Framework
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
The Conceptual Framework and Objectives of Financial Reporting
1 Chapter 11 Drivers of online-selling diffusion.
Introduction Challenges of Managing in a Network Economy.
Topics Covered: Software requirement specification(SRS) Software requirement specification(SRS) Authors of SRS Authors of SRS Need of SRS Need of SRS.
Architecture-Based Runtime Software Evolution Peyman Oreizy, Nenad Medvidovic & Richard N. Taylor.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
1 Software Testing and Quality Assurance Lecture 33 – Software Quality Assurance.
© 2014 Cengage Learning. All rights reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
© Synergetics Portfolio Security Aspecten.
1 WEB Engineering E-Commerce Strategy & Management COM350.
ELECTRONIC CONVEYANCING WORKSHOPS 2009 Simon Libbis Executive Director Ann Kinnear Operations Manager.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
Health Care Information Systems Research in CERCS Doug Blough.
Issues of Quality and Trust in Computing Jo Lumsden Aston University Birmingham, UK.
1 JOINT ECB-MNB CONFERENCE Moving away from a cash-based payment system to a “less cash” society Budapest November 2012.
Improving Integration of Learning and Management Systems Paul Shoesmith Director of Technical Strategy Becta.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Copying distribution or use of the contents of this document is prohibited without written authorization from SafeHarbor Technology Corporation. Maximizing.
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
Fault Tolerance Benchmarking. 2 Owerview What is Benchmarking? What is Dependability? What is Dependability Benchmarking? What is the relation between.
Software Testing and Quality Assurance Software Quality Assurance 1.
July 14 th SAM 2008 Las Vegas, NV An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing Danfeng (Daphne) Yao Rutgers University,
Network design Topic 1 Business goals. Agenda Network life cycle Network design process Business goals Scope Constraints.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Computer Science and Engineering 1 Mobile Computing and Security.
E-Profile-based Security for Critical Transactions in Web Applications Written by: Jean Stephan et al., 2009 Reported by: Renato Casipe, 2/15/2010.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
RATIONALE Interaction is the most debated construct in the world of technology mediated learning design and development. In these settings, interaction.
Defining Marketing for 21 st century. What is Marketing? “ marketing is about identifying and meeting human and social needs with profit” “marketing includes.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
M.-E. Bégin¹, S. Da Ronco², G. Diez-Andino Sancho¹, M. Gentilini³, E. Ronchieri ², and M. Selmi² ¹CERN, Switzerland, ² INFN-Padova, Italy, ³INFN-CNAF,
A TEN-YEAR UPDATE The DeLone and McLean Model of Information Systems Success (D&M IS)
Stages of Research and Development
Chapter 2 Planning, Implementing, and Controlling Marketing Strategies
Supply Chain Management
Update from the Faster Payments Task Force
Why API?.
AIM Operational Concept
Chapter 18 MobileApp Design
A reference framework for consumers' digital competence
Customer Service Training
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Supply Chain Management
Advancing Telemedicine Adoption in Europe – Developing capacities
IT Audit Capacity Building
The Banking Council South Africa
Software Engineering for Safety: a Roadmap
Web Information Systems Engineering (WISE)
WS Standards – WS-* Specifications
FrAmework for Multi-agency Environments
Presentation transcript:

E-Profile-based Security for Critical Transactions in Web Applications Written by: Jean Stephan et al., 2009 Reported by: Renato Casipe, 2/15/2010

Dominant Web development drivers Reliability –Applications that work well do not crash, and do not provide incorrect data. Usability –“the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use”. Security –Applications that handle customer data and other information safely, so that problems such as financial loss, legal consequences, and loss of credibility can be avoided.

Goal of the Paper The goal of this paper is to propose a security framework which depends on the collaboration of ecommerce stakeholders in order to build an infrastructure that provides confidence and security while respecting the privacy of individuals at the same time.

The Model “The main thrust of our model is assessing the profile of a user and determining the confidence level which can be entrusted in the user. The overall framework of our model consists of two main components: User profile development and confidence determination and decision making.

Process Flow Legend User Profile Development: R = f (S1, S2, S3, S4, P, F, G)

Process Flow Legend Confidence Coefficient: C = f (T, R, K)…

Process Flow of Distributed Model User Profile Development: R = f (S1, S2, S3, S4, P, F, G) Confidence Coefficient: C = f (T, R, K)…Depending on the outcome of C, the vendor may decide to allow or decline the transaction. Profile Builder -> Rating Agent -> Confidence Determiner -> Vendor Decision

Authors Conclusion Preserves privacy by centralizing the access to user profiles and acquiring a rating through a profile assessment service. Identity Management is no longer based on static data. Instead, the user’s profile is a dynamic entity which evolves with time and matures based on the user’s behavior, experience, and/or interventions. E-commerce websites will be able to set their own security rules to manage critical transactions and clarify their filtering schema. Collaboration of different stakeholders will provide a rich added value towards a more trustworthy Internet-based economy.