Abstract

ABSTRACT By secure electronic transaction (SET) protocol, business and customers can construct different electronic commerce models on the Internet. In this paper, we propose a method based on Petri net models and techniques of software engineering to detect unusual electronic commerce transactions. Users can construct all electronic commerce transactions of business and customers by SET. Because of features and functions of SET, users can get security and verification on the network transactions. Using our proposed technique, electronic commerce designers can detect potential security flaws in transaction behavior on the Internet and find any electronic transaction problems that need to solve.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call