UDC 004.41.5

Simulation Analysis of Protected B2B e-Commerce Processes

Zoran V. Živković1 and Milorad J. Stanojević2

  1. The Institute of Applied Mathematics and Electronics
    Kneza Miloša 37, 11000 Belgrade, Serbia
    ezoran@beotel.yu
  2. Faculty of Transport and Traffic Engineering
    Vojvode Stepe 305, 11000 Belgrade, Serbia
    milorad@sf.bg.ac.yu

Abstract

In this paper a simulation analysis of certain trust models (complex PKI architectures) with regard to the security support of B2B applications on the Internet is presented. The objective of such an analysis has been the choice of the most efficient PKI architecture and a solution of the cryptographic interoperability problem. A simulation model of protected B2B e-commerce has also been presented, based on the chosen PKI architecture. This paper has shown the significance of the up-to-date cryptographic mechanisms: digital signature and digital certificate to deliver the main security services based on PKI.

Publication information

Volume 3, Issue 1 (Jun 2006)
Year of Publication: 2006
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Živković, Z. V., Stanojević, M. J.: Simulation Analysis of Protected B2B e-Commerce Processes. Computer Science and Information Systems, Vol. 3, No. 1, 77-91. (2006)