Modeling And Corroboration of E Shopping Business Processes of Malevolent

Authors(2) :-M. Pavan Kumar Reddy, K.Sunitha

As of late, internet shopping incorporating third-party payment platforms (TPPs) acquaints new security challenges due with complex connections between Application Programming Interfaces (APIs) of Merchants and TPPs. Noxious customers may misuse security vulnerabilities by calling APIs in a self-assertive request or assuming different parts. To manage the security issue in the beginning periods of framework improvement, this paper shows a formal technique for demonstrating and confirmation of Online shopping business forms with vindictive conduct designs considered in light of Petri nets. We propose a formal model called E-Commerce Business Process Net to show an ordinary Online shopping business process that speak to planned capacities, and pernicious conduct designs speaking to a potential assault that damages the security objectives at the necessity examination stage. At that point, we integrate the typical business process and pernicious conduct designs by an incremental demonstrating technique. Therefore, our approach can influence the product to configuration provably secured from the malevolent assaults at process configuration time and, hence, decreases the trouble and cost of change for flawed frameworks at the discharge stage. We exhibit our approach through a contextual investigation

Authors and Affiliations

M. Pavan Kumar Reddy
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Business process, e-commerce, online shopping, software design, trustworthiness, verification

  1. Research: 2014 Q2 e-commerce market core data, 2014Online Available:
  2. P. Neumann, "Principled assuredly trustworthy composable architectures,"SRI Int. Compute. Sci. Laboratory, pp. 100–109, 2004.
  3. F. Swiderski and W. Snyder, Threat Modeling. Sebastopol, CA,USA: O’Reilly Media, Inc, 2009.
  4. A. Kalam and N. Idboutker, "Specification and verification of security properties of e-Contracts," in Proc. 8th Int. Conf. Commun, Bucharest,Romania, 2010, pp. 427–430.
  5. J. D. Tygar, "Atomicity in electronic commerce," in Proc. 15th Annu.ACM Symp. Principles Distrib. Comput., New York, NY, USA, 1996,pp. 8–26.
  6. M. Abadi, "Security protocols: Principles and calculi," Foundations Security Anal. Des. IV, vol. 4677, pp. 1–23, 2007.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 416-420
Manuscript Number : CSEIT184112
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. Pavan Kumar Reddy, K.Sunitha, "Modeling And Corroboration of E Shopping Business Processes of Malevolent", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.416-420, March-April-2018.
Journal URL :

Article Preview

Follow Us

Contact Us