求电子商务方面的英文文献或论文,翻译成汉字大约3000字。要有明确正规出处

一定要有正规的出处。要英语的,万分感谢。

Ecommerce Security Issues
Customer Security: Basic Principles

Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

privacy: information must be kept from unauthorized parties.

integrity: message must not be altered or tampered with.

authentication: sender and recipient must prove their identities to each other.

non-repudiation: proof is needed that the message was indeed received.

Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such procedures form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).

Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.

:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.

What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.

:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Individual packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.

:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.

Firewalls (software or hardware) protect a server, a network and an individual PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.

Transactions
Sensitive information has to be protected through at least three transactions:

credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.

credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).

Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.

2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.

3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.

4. Where credit cards are taken online and processed in real time, four situations arise:

You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.

You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.

You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.

You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).

Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.

Sites on our resources page supplies details.
温馨提示:内容为网友见解,仅供参考
无其他回答

关于电子商务的外文翻译成中文,中英文都要,2000字以上,要注明出处...
nternet作为电子商务的载体,已成为企业必不可少的信息采集、传输和交换的工具,网络(信息)时代的到来为基于Internet的IT服务业注入了新的活力,Internet is electronic vehicle for business on line, it turns to be unsplit tool for company for the purpose of collection, transferring and exchange...

求两篇关于电子商务英文参考文献
【英文篇名】 Managing Channels of Distribution Under the Environment of Electronic Commerce 【作者英文名】 ZHENG Bing~1 FENG Yixiong~2 1.College of Economics & Management; Dalian University; Dalian 116622; China 2.State Key Laboratory of CAD&CG; Zhejiang University; Hangzhou 310027; Ch...

论文题目和摘要翻译成英文
China's B2C e-commerce sites profit model of comparative study 摘要和关键字:中国经济正在高速的发展,电子商务经济在经济发展的道路上有着特殊及不可或缺的角色。Abstract and keywords: China's economy is the rapid development of e-commerce in the economic development of the economy on th...

我要一篇关于电子商务的中英文对译,大概2000字。谢谢,希望帮忙
电子商务平台可以是高价,这取决于复杂的程度。一个发展组织开展电子商务活动应考虑是否要承担比预期的要高的费用和预期销售水平可能的成本回收。这项活动收到来自捐助机构或合作伙伴组织的财政援助的可能是什么?发展组织根据其财政能力追求电子商务活动的多种选择可能决定他们的网上销售活动。这些选项可以分为1)技术的硬件...

求助一篇关于C2C电子商务模式的外文文献!
1、The Legal Implications of the C2C Electronic Commerce Model http:\/\/poseidon01.ssrn.com\/delivery.php?ID=902066029110124004089017113097092072097006058033028058068073002065002065087075028092057052021031061034047030111011009091112007033042087084097124112117074096094085020015027004021011087112106016118092&EXT=pdf 参考资料:OA图书...

求电子商务毕业论文的撰写要求?怎样发表?
完整的毕业论文或毕业设计报告应由下列几部分构成:题名(标题)、目录、摘要(中外文)、引言(前言)、正文、结论、参考文献和附录等。 一、毕业论文撰写的内容与要求 1、标题:标题应该简短、明确,要有概括性。让人看后能大致了解文章的确切内容、专业的特点和研究的范畴。标题的字数要适当,一般不宜超过20字。 2、目...

请问:英文文献多少页可翻译成3000字左右的中文?
word 文档五号字的英文,每页最多可能有700字,而对应的中文有1200字左右 所以要中文3000字的话,那么英文应该找大概2000或者以下,当然要看哪个领域的了,专业词汇多的,一个英语单词都要翻译成好几个中文字呢.我是按照我自己的一篇日常文章来给您计算的.希望对你有所帮助 ...

有关于网络营销方面的英文文章300字左右,加中文翻译的!谢谢!!
from a strategic Analysis of the height of China's SMEs combat the specific network marketing strategy.随着计算机技术和INTERNET的迅速发展,时间和空间的概念、消费者的概念、市场的性质和市场行为等皆发生了深刻变化,网络营销应运而生。网络的诞生也推动了电子商务、网络经济的飞速发展。网络营销也...

【英语论文】跨境电商平台上产品的英译方法
跨境电商平台分为出口外国和进口货物跨境两类,主要分为国际B2C跨境电商平台和进口跨境电商平台。在这些平台的英文网页中,产品翻译通常采用机器翻译与人工翻译并用的方式,但整体性和可读性仍有待改进。本文旨在探讨商务英语翻译原则与技巧,解决跨境电商贸易中的翻译问题。商务英语,核心在于商务,以适应职场...

求一篇外文翻译 要中英对照的 最好有出处
约翰.杜威曾经非常严肃地指出:风俗在形成个人行为方面所起的作用和一个对风俗的任何影响相比,就好像他本国语言的总词汇量和自己咿呀学语时他家庭所接纳的他的词汇量之比。当一个人认真地研究自发形成的社会秩序时,杜威的比喻就是他实事求是观察得来的形象化的说法。个人的生活史首先是适应他的社团世代...

相似回答