Until recently little research had been undertaken into the process of eCommerce implementation, especially in relation to the implementation of business-to-business (B2B) relatio...
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Electronic-banking applications (EBAs) are among the pioneers of electroniccommerce (e-commerce) applications. Like other e-commerce applications, they require sophisticated secur...
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Static function hierarchies and models of the dynamic behaviour are typically used in e-commerce systems. Issues to be verifies are the completeness and correctness of the static f...