Proactive Security Framework for Online Business Web Portals with Implementation Details

Volume: 3 Number: 2 June 28, 2014
  • Hemraj Saini
EN

Proactive Security Framework for Online Business Web Portals with Implementation Details

Abstract

Most of the critical information is stored or travelled throughout the Internet and prone to cyber threats all the time. The current manuscript provides a process to develop and implement an automated proactive security framework to alert/avoid such cyber threats for the critical online information. In addition, it also describes a feasibility study towards the adoption of the proposed process by the current user community with favorable results.

The proposed work is able to help for the development of security add-ons to almost all the embedded software applications for the better secured services to the users.

Keywords

References

  1. H. Saini and T. C. Panda, “Extended Cyber Defense Architecture for a University –A Case study”, The IUP Journal of Science & Technology, 6(2):33-47, 2010.
  2. H. Saini and D. Saini, “Proactive cyber Defense and Reconfigurable Framework of Cyber Security”, International journal named International Review on Computer and Software (IRECOS), 2(2):89-97, 2007.
  3. S. Bayat, R.H.Y. Louie, Z. Han, B. Vucetic and Y. Li, “Physical-Layer Security in Distributed Wireless Theory”, Networks Information Forensics and Security, IEEE Transactions on, Volume: 8, Issue: 5, pp.- 717-732, 2013.
  4. E. Harrin, “Taking a Layered Approach to IT Security”, Retrieved April, http://www.esecurityplanet.com/network-security/taking- a-layered-approach-to-it-security.html Available at: I. Lien, Y. Lin, J. Shieh and J. Wu, “A Novel Privacy Preserving Location-Based Service Protocol with Secret Circular Shift for k-NN Search”, Information Forensics and Security, IEEE Transactions on , Volume: PP , Issue: 99, 2013, DOI: 10.1109/TIFS.2013.2252011.
  5. H. Saini, K. D. Sharma, P. Dadheech and T. C. Panda, “Enhanced 4-way Handshake Process in IEEE802.11i with Cookies”, International Journal of Information & Network Security (IJINS), 2(3), pp. 229~238, 2013.
  6. L. Sankar, S. Rajagopalan and H. Poor, “Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach”, Information Forensics and Security, IEEE Transactions on,Volume: PP , Issue: 99, pp.-1-15, 2013.
  7. J. Han, W. Susilo, and Y. Mu, “Identity-Based Secure Distributed Data Storage Schemes”, Computers, IEEE Transactions on, Volume: PP , Issue: 99, 2013, DOI: 10.1109/TC.2013.26.
  8. H. Saini, B. K. Mishra and T. C. Panda, “Computing the Spreading Power of a Business Portal to Propagate the Malicious Information in the Network”, International Journal of Web Protals, 3(2), 14-22, 2011.

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Hemraj Saini This is me

Publication Date

June 28, 2014

Submission Date

January 30, 2016

Acceptance Date

-

Published in Issue

Year 2014 Volume: 3 Number: 2

APA
Saini, H. (2014). Proactive Security Framework for Online Business Web Portals with Implementation Details. International Journal of Information Security Science, 3(2), 156-164. https://izlik.org/JA96RC45KD
AMA
1.Saini H. Proactive Security Framework for Online Business Web Portals with Implementation Details. IJISS. 2014;3(2):156-164. https://izlik.org/JA96RC45KD
Chicago
Saini, Hemraj. 2014. “Proactive Security Framework for Online Business Web Portals With Implementation Details”. International Journal of Information Security Science 3 (2): 156-64. https://izlik.org/JA96RC45KD.
EndNote
Saini H (June 1, 2014) Proactive Security Framework for Online Business Web Portals with Implementation Details. International Journal of Information Security Science 3 2 156–164.
IEEE
[1]H. Saini, “Proactive Security Framework for Online Business Web Portals with Implementation Details”, IJISS, vol. 3, no. 2, pp. 156–164, June 2014, [Online]. Available: https://izlik.org/JA96RC45KD
ISNAD
Saini, Hemraj. “Proactive Security Framework for Online Business Web Portals With Implementation Details”. International Journal of Information Security Science 3/2 (June 1, 2014): 156-164. https://izlik.org/JA96RC45KD.
JAMA
1.Saini H. Proactive Security Framework for Online Business Web Portals with Implementation Details. IJISS. 2014;3:156–164.
MLA
Saini, Hemraj. “Proactive Security Framework for Online Business Web Portals With Implementation Details”. International Journal of Information Security Science, vol. 3, no. 2, June 2014, pp. 156-64, https://izlik.org/JA96RC45KD.
Vancouver
1.Hemraj Saini. Proactive Security Framework for Online Business Web Portals with Implementation Details. IJISS [Internet]. 2014 Jun. 1;3(2):156-64. Available from: https://izlik.org/JA96RC45KD