2007 | OriginalPaper | Chapter
Online Business Security Technologies
Published in: Online Business Security Systems
Publisher: Springer US
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
This chapter examines Online Business Security Technologies. The chapter examines security standards and protocols such as SET, SSL and IPSEC. The chapter explains the role of Virtual Private Networks in Online Business transactions. The role of crypto-systems in security is also explained. New trends in authentication are introduced, whiles common models such as PPP, CHAP, Kerberos and Biometrics are also re-examined.