Design Of A Secure B2B Environment Cover Image

Design Of A Secure B2B Environment
Design Of A Secure B2B Environment

Author(s): Ivica Stanković, Aleksandar Mihajlović, Radomir Mihajlović
Subject(s): Economy
Published by: Fakultet za poslovne studije i pravo
Keywords: E-commerce; e-business; business transactions; B2B; C2B; system topology; system logical architecture; encryption; decryption; security tunnel; protection granularity

Summary/Abstract: This paper presents application of the topological physical space and software logical layered approaches to design of distributed business to business (B2B) systems. Being a tutorial in nature, this paper is stressing explicitly strict, almost formal, technical terminology, which has been loosely used in relevant technical literature. In the introductory part we discuss general e-business sytem design issues, focusing on B2B systems with built in security components necessary for secure business transactions. Special attention is devoted to the integration of individual systems of B2B business partners without any additional modification or redesign of the original existing local business automation software versions.We insist on B2B designs without any existing software alterations caused by security problems. With such a design approach, security problems become totally transparent to the original designers of the business partner’s local systems and future users of B2B systems Special attention is devoted to the problems of possible drastic asymmetry of B2B business partners, where one partner could be too small and the other too large, resulting in degeneration of the B2B to customer to business or C2B system. Finally, we present design alternatives with different distributions of cryptographic modules in space, across the network topology and logically, along the stack of software layers and protocols.

  • Issue Year: 2/2012
  • Issue No: 6
  • Page Range: 89-106
  • Page Count: 18
  • Language: English
Toggle Accessibility Mode