Reputation management and signature delegation: A distributed approach Omaima BamasakNing Zhang OriginalPaper Pages: 227 - 263
The formal-CAFE methodology and model checking patterns in the specification of e-commerce systems A. PereiraM. SongG. Gorgulho OriginalPaper Pages: 265 - 303
Security requirement analysis of business processes Peter HerrmannGaby Herrmann OriginalPaper Pages: 305 - 335
eInvoke: Secure e-Invoicing based on web services Alexandros KaliontzoglouPelagia BoutsiDespina Polemi OriginalPaper Pages: 337 - 353
A distributable security management architecture for enterprise systems spanning multiple security domains Ioannis PriggourisStathes Hadjiefthymiades OriginalPaper Pages: 355 - 388
Effect of technological breakthroughs on electronic markets Xiaotong LiJatinder N. D. GuptaJames V. Koch OriginalPaper Pages: 389 - 404