Skip Nav Destination
ASME Press Select Proceedings
International Conference on Electronics, Information and Communication Engineering (EICE 2012)
By
Garry Lee
Garry Lee
Information Engineering Research Institute
Search for other works by this author on:
ISBN:
9780791859971
No. of Pages:
1008
Publisher:
ASME Press
Publication date:
2012
eBook Chapter
165 Application and Research of Trusted Computing-Based Distributed Data Protection Technology in E-Commerce System
By
Lei Xiao
,
Lei Xiao
Intelligent Information Systems Institute,
Wenzhou University
, China
Search for other works by this author on:
Zhongyi Hu
,
Zhongyi Hu
Intelligent Information Systems Institute,
Wenzhou University
, China
Search for other works by this author on:
Xiaohai Zheng
Xiaohai Zheng
Intelligent Information Systems Institute,
Wenzhou University
, China
Search for other works by this author on:
Page Count:
6
-
Published:2012
Citation
Xiao, L, Hu, Z, & Zheng, X. "Application and Research of Trusted Computing-Based Distributed Data Protection Technology in E-Commerce System." International Conference on Electronics, Information and Communication Engineering (EICE 2012). Ed. Lee, G. ASME Press, 2012.
Download citation file:
This paper analyses data characteristics and storage requirements of E-Commerce System, finds that how to control the data storage has become an important security problem and summarizes technological characteristics, key technologies and implementation models of the current distributed data protection. Although the current research shows that using control concept and model apply to such problems, but its implementation mechanism research is still in the initial stage. This paper puts forward a kind of trusted computing-based distributed data protection technology, which provides a reference for the development of distributed data protection.
Topics:
E-commerce
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Optimizing Turnaround Time for Mobile Agents in Centralized Key Server Scheme
International Conference on Future Computer and Communication, 3rd (ICFCC 2011)
Research on Identity Authentication System Based on an Improved One-Time Password Scheme
International Conference on Electronics, Information and Communication Engineering (EICE 2012)
The Application of E-Commerce in Travel Enterprises:A Case Study of ELong.Com
International Conference on Electronics, Information and Communication Engineering (EICE 2012)
Audit and Evaluation of E-Commerce System
International Conference on Electronics, Information and Communication Engineering (EICE 2012)
Related Articles
Augmented Reality E-Commerce System: A Case Study
J. Comput. Inf. Sci. Eng (June,2010)
Eliciting Attribute-Level User Needs From Online Reviews With Deep Language Models and Information Extraction
J. Mech. Des (June,2021)
A Systematic Function Recommendation Process for Data-Driven Product and Service Design
J. Mech. Des (November,2017)