• DocumentCode
    624012
  • Title

    A methodology for designing trustworthy e-commerce applications

  • Author

    Azzedin, Farag ; Mahmood, Sajjad

  • Author_Institution
    Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
  • fYear
    2013
  • fDate
    20-24 May 2013
  • Firstpage
    143
  • Lastpage
    148
  • Abstract
    Trustworthy e-commerce applications are not easy to design. Currently, patches are periodically released to countermeasure trust issues that arise in e-commerce communities. In this paper, we propose a methodology for designing trustworthy applications that enables an application designer to model applications resilient to trust related threats early in the development life cycle. Such modeling requires understanding of the system data flow and how the different processes use the system data. Our methodology consists of two phases, namely, data flow trust model and trust mitigation model.
  • Keywords
    electronic commerce; trusted computing; data flow trust model; trust issues; trust mitigation model; trustworthy e-commerce application design; Analytical models; Business; Data models; Metals; Security; Software; Unified modeling language; E-Commerce; Software Design; Trustworthiness; UML;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Collaboration Technologies and Systems (CTS), 2013 International Conference on
  • Conference_Location
    San Diego, CA
  • Print_ISBN
    978-1-4673-6403-4
  • Type

    conf

  • DOI
    10.1109/CTS.2013.6567220
  • Filename
    6567220