Simulation Analysis of Protected B2B e-Commerce Processes
Computer Science and Information Systems, Tome 3 (2006) no. 1.

Voir la notice de l'article provenant de la source Computer Science and Information Systems website

In this paper a simulation analysis of certain trust models (complex PKI architectures) with regard to the security support of B2B applications on the Internet is presented. The objective of such an analysis has been the choice of the most efficient PKI architecture and a solution of the cryptographic interoperability problem. A simulation model of protected B2B e-commerce has also been presented, based on the chosen PKI architecture. This paper has shown the significance of the up-to-date cryptographic mechanisms: digital signature and digital certificate to deliver the main security services based on PKI.
@article{CSIS_2006_3_1_a6,
     author = {Zoran V. \v{Z}ivkovi\'c and Milorad J. Stanojevi\'c},
     title = {Simulation {Analysis} of {Protected} {B2B} {e-Commerce} {Processes}},
     journal = {Computer Science and Information Systems},
     publisher = {mathdoc},
     volume = {3},
     number = {1},
     year = {2006},
     url = {http://geodesic.mathdoc.fr/item/CSIS_2006_3_1_a6/}
}
TY  - JOUR
AU  - Zoran V. Živković
AU  - Milorad J. Stanojević
TI  - Simulation Analysis of Protected B2B e-Commerce Processes
JO  - Computer Science and Information Systems
PY  - 2006
VL  - 3
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/CSIS_2006_3_1_a6/
ID  - CSIS_2006_3_1_a6
ER  - 
%0 Journal Article
%A Zoran V. Živković
%A Milorad J. Stanojević
%T Simulation Analysis of Protected B2B e-Commerce Processes
%J Computer Science and Information Systems
%D 2006
%V 3
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/CSIS_2006_3_1_a6/
%F CSIS_2006_3_1_a6
Zoran V. Živković; Milorad J. Stanojević. Simulation Analysis of Protected B2B e-Commerce Processes. Computer Science and Information Systems, Tome 3 (2006) no. 1. http://geodesic.mathdoc.fr/item/CSIS_2006_3_1_a6/