A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents

A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents

Hamidreza Amouzegar, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji
Copyright: © 2009 |Volume: 3 |Issue: 4 |Pages: 11
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781616920685|EISSN: 1930-1669|DOI: 10.4018/jisp.2009100102
Cite Article Cite Article

MLA

Amouzegar, Hamidreza, et al. "A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents." IJISP vol.3, no.4 2009: pp.18-28. http://doi.org/10.4018/jisp.2009100102

APA

Amouzegar, H., Tarokh, M. J., & Hidaji, A. N. (2009). A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents. International Journal of Information Security and Privacy (IJISP), 3(4), 18-28. http://doi.org/10.4018/jisp.2009100102

Chicago

Amouzegar, Hamidreza, Mohammad Jafar Tarokh, and Anahita Naghilouye Hidaji. "A New Soa Security Model to Protect Against Web Competitive Intelligence Attacks by Software Agents," International Journal of Information Security and Privacy (IJISP) 3, no.4: 18-28. http://doi.org/10.4018/jisp.2009100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article presents an automata SOA based security model against competitive intelligence attacks in e-commerce. It focuses on how to prevent conceptual interception of an e-firm business model from CI agent attackers. Since competitive intelligence web environment is a new important approach for all e-commerce based firms, they try to come in new marketplaces and need to find a good customer-base in contest with other existing competitors. Many of the newest methods for CI attacks in web position are based on software agent facilities. Many researchers are currently working on how to facilitate CI creation in this environment. The aim of this paper is to help e-firm designers provide a non-predictable presentation layer against CI attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.