共 50 条
- [1] Security features and technologies for E-business architecture design IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1150 - +
- [2] E-business security design using process security requirements septet SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 408 - 413
- [3] Modelling e-business security using business processes SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +
- [4] A security blueprint for e-business applications based on the three-tier architecture 2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2004, : 879 - 884
- [5] Measurement of Firm E-business Capability to Manage and Improve Its E-business Applications ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 101 - 107
- [7] Research on the evaluation in alliance e-business security 2010 INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING: IC4E 2010, PROCEEDINGS, 2010, : 74 - 78
- [8] AWARENESS ON DIGITAL SECURITY AND E-BUSINESS IN NIGERIA 4TH INTERNATIONAL CONFERENCE ON EDUCATION, SOCIAL SCIENCES AND HUMANITIES (SOCIOINT 2017), 2017, : 1402 - 1408
- [9] Networking security and privacy strategies in e-business Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 70 - 73
- [10] Data quality in e-business applications WEB SERVICES, E-BUSINESS, AND THE SEMANTIC WEB, 2002, 2512 : 121 - 138