Modeling And Corroboration of E Shopping Business Processes of Malevolent

Authors

  • M. Pavan Kumar Reddy  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
  • K.Sunitha  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Keywords:

Business process, e-commerce, online shopping, software design, trustworthiness, verification

Abstract

As of late, internet shopping incorporating third-party payment platforms (TPPs) acquaints new security challenges due with complex connections between Application Programming Interfaces (APIs) of Merchants and TPPs. Noxious customers may misuse security vulnerabilities by calling APIs in a self-assertive request or assuming different parts. To manage the security issue in the beginning periods of framework improvement, this paper shows a formal technique for demonstrating and confirmation of Online shopping business forms with vindictive conduct designs considered in light of Petri nets. We propose a formal model called E-Commerce Business Process Net to show an ordinary Online shopping business process that speak to planned capacities, and pernicious conduct designs speaking to a potential assault that damages the security objectives at the necessity examination stage. At that point, we integrate the typical business process and pernicious conduct designs by an incremental demonstrating technique. Therefore, our approach can influence the product to configuration provably secured from the malevolent assaults at process configuration time and, hence, decreases the trouble and cost of change for flawed frameworks at the discharge stage. We exhibit our approach through a contextual investigation

References

  1. Research: 2014 Q2 e-commerce market core data, 2014Online Available: http://news.iresearch.cn/zt/235917.shtml
  2. P. Neumann, "Principled assuredly trustworthy composable architectures,"SRI Int. Compute. Sci. Laboratory, pp. 100–109, 2004.
  3. F. Swiderski and W. Snyder, Threat Modeling. Sebastopol, CA,USA: O’Reilly Media, Inc, 2009.
  4. A. Kalam and N. Idboutker, "Specification and verification of security properties of e-Contracts," in Proc. 8th Int. Conf. Commun, Bucharest,Romania, 2010, pp. 427–430.
  5. J. D. Tygar, "Atomicity in electronic commerce," in Proc. 15th Annu.ACM Symp. Principles Distrib. Comput., New York, NY, USA, 1996,pp. 8–26.
  6. M. Abadi, "Security protocols: Principles and calculi," Foundations Security Anal. Des. IV, vol. 4677, pp. 1–23, 2007.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
M. Pavan Kumar Reddy, K.Sunitha, " Modeling And Corroboration of E Shopping Business Processes of Malevolent, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.416-420, March-April-2018.