Petri net-based methods for analyzing structural security in e-commerce business processes

被引:14
|
作者
Yu, Wangyang [1 ,2 ,3 ]
Ding, Zhijun [4 ]
Liu, Lu [5 ]
Wang, Xiaoming [1 ,2 ,3 ]
Crossley, Richard David [5 ]
机构
[1] Minist Educ, Key Lab Modern Teaching Technol, Xian 710062, Peoples R China
[2] Engn Lab Teaching Informat Technol Shaanxi Prov, Xian 710119, Peoples R China
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[4] Tongji Univ, Dept Comp Sci, Shanghai 201804, Peoples R China
[5] Univ Derby, Dept Elect Comp & Math, Derby DE221 GB, England
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 109卷
基金
中国国家自然科学基金;
关键词
Petri net; E-commerce; Business process; Structural security; CORRECTNESS;
D O I
10.1016/j.future.2018.04.090
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rapid development of e-commerce worldwide, means more e-commerce business processes adopting the structure of multiple participants; these include shopper clients, merchant and third-party payment platforms (TPPs), banks, and so on. It is a distributed and complex system, where communications among these participants rely on the web services and Application Programming Interfaces (APIs) such as Cashier-as-a-Service or CaaS. This introduces new security challenges due to complex interactions among multiple participants, and any design flaws in procedure structures may result in serious security issues. We study the structural security issues based on Petri nets, and a framework for analyzing structural security in e-commerce business process is proposed. Petri net-based modeling and analysis methods are also provided. Given the specifications of e-commerce business processes, the proposed methods can help designers analyze structural security issues of an e-commerce business process. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:611 / 620
页数:10
相关论文
共 50 条
  • [31] Development of E-Commerce Applications based on RAD Methods for MSMEs Furniture Business in Central Java']Java
    Utomo, Rooswhan Budhi
    Akbar, Ali
    Andriansyah, Miftah
    Lasminiasih
    Utami, Suryandari Sedyo
    2018 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICON EEI): TOWARD THE MOST EFFICIENT WAY OF MAKING AND DEALING WITH FUTURE ELECTRICAL POWER SYSTEM AND BIG DATA ANALYSIS, 2018, : 75 - 80
  • [32] Towards an e-commerce recommendation system based on MCDM methods
    Baczkiewicz, Aleksandra
    Kizielewicz, Bartlomiej
    Shekhovtsov, Andrii
    Watrobski, Jaroslaw
    Wieckowski, Jakub
    Salabun, Wojciech
    2021 INTERNATIONAL CONFERENCE ON DECISION AID SCIENCES AND APPLICATION (DASA), 2021,
  • [33] Study on security based on PKI for e-commerce of statistics information system
    Liu, Min
    Sun, Shudong
    Xing, Miaotiao
    SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE, VOLS 1 AND 2, SELECTED PROCEEDINGS, 2005, : 729 - 732
  • [34] A Method for DEVS Simulation of E-Commerce Processes for Integrated Business and Technology Evaluation (WIP)
    Maria Chezzi, Carlos
    Rosa Tymoschuk, Ana
    Lerman, Ricardo
    SYMPOSIUM ON THEORY OF MODELING & SIMULATION - DEVS INTEGRATIVE M&S SYMPOSIUM (DEVS 2013) - 2013 SPRING SIMULATION MULTI-CONFERENCE (SPRINGSIM'13), 2013, 45 (04): : 90 - 95
  • [35] A Reduction Method of Analyzing Data-Liveness and Data-Boundedness for a Class of E-commerce Business Process Nets
    Yu, Wangyang
    Liu, Guanjun
    He, Leifeng
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 70 - 83
  • [36] Performance Measurement Based on Coloured Petri Net Simulation of Scalable Business Processes
    Fauzan, Abd Charis
    Sarno, Riyanarto
    Yaqin, Muhammad Ainul
    2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 257 - 262
  • [37] A Novel Petri net-Based Approach for the detection of Security Attacks by Monitoring and Predicting the Information System Quality degradation
    Djemaiel, Yacine
    Boudriga, Noureddine
    CRAFTING GLOBAL COMPETITIVE ECONOMIES: 2020 VISION STRATEGIC PLANNING & SMART IMPLEMENTATION, VOLS I-IV, 2014, : 622 - 631
  • [38] Blockchain based Confidentiality and Integrity Preserving Scheme for Enhancing E-commerce Security
    Shaikh, Javed R.
    2018 2ND IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN - 2018), VOL II, 2018, : 155 - 158
  • [39] MODELING AND ANALYZING USER BEHAVIOR RISKS IN ONLINE SHOPPING PROCESSES BASED ON DATA-DRIVEN AND PETRI-NET METHODS
    Yu, Wangyang
    Ma, Zhuojing
    Zhai, Xiaojun
    Zhou, Yuke
    Zhou, Weiwei
    Liu, Yuan
    COMPUTING AND INFORMATICS, 2023, 42 (02) : 501 - 524
  • [40] A Petri net-based heuristic for mixed-model assembly line balancing problem of Type-E
    Su, Ping
    Wu, NaiQi
    Yu, ZhaoQin
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2014, 52 (05) : 1542 - 1556