Skip to main content
Log in

Building blocks of e-commerce

  • Published:
Sadhana Aims and scope Submit manuscript

Abstract

This article examines the architecture of e-commerce as a set of layers, each supporting the one above it. The layers have clean interfaces, that is, they can be designed independently. We present an architecture with six layers. The lowest layer consists of a physical communication network such as local area network or public switched telephone networks. The next higher layer is the logical layer which describes the protocol used to interconnect communication systems to create internet, intranet and extranet. The services provided over the internet infrastructure, namely, e-mail, world wide web etc., are described in what is called network services layer. It is essential to ensure security of messages, documents etc., which are transmitted using network services. The messaging layer is thus concerned with encryption methods, both private and public key encryption and their applications. We call the layer above this the middleman service, which is concerned with value-added services offered by intermediaries to enable payment for services received, certify digital signatures, safely transmit documents and provide information on behalf of companies. The topmost layer is the application layer which users see. The major applications are customer-to-business (C2B) e-commerce, business-to-business (B2B) e-commerce, customer-to-consumer (C2C) e-commerce etc. We briefly explain these modes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Awad E M 2002Electronic commerce (New Delhi: Prentice Hall of India)

    Google Scholar 

  • Ben-Ameur W, Kerivin H 2003 New economical virtual private networks.Commun. ACM 46(6): 69–73

    Article  Google Scholar 

  • Brewer E A (ed.) 2002 The consumerside of search.Commun. ACM 45(9): 40–56

    Google Scholar 

  • Chaum D 1992 Achieving electronic privacy.Sci. Am. 96–101

  • Cheswick W R, Belleroin G M 1994Firewalls and internet security (Reading, MA: Addison Wesley)

    MATH  Google Scholar 

  • Comer D E 1995Internetworking with TCP/IP (New Delhi: Prentice Hall of India) vol. 1

    MATH  Google Scholar 

  • Daemen J, Rijmen V 2002The design of Rijndael. AES — The advanced encryption standard (New York: Springer-Verlag)

    MATH  Google Scholar 

  • Duggal P 2000Cyberlaw in India — An analysis (New Delhi: Saakshar)

    Google Scholar 

  • Johnson D G 2001Computer ethics (New Delhi: Pearson Education Asia)

    Google Scholar 

  • Kalakota R, Whinston A B 1999Frontiers of e-commerce (Reading, MA: Addison-Wesley/Longman)

    Google Scholar 

  • Landau S 2000 Designing cryptography for the new century.Commun. ACM 43(5): 115–120

    Article  Google Scholar 

  • Lynch D C, Lundquist L 1996Digital money: The new era of internet commerce (New York: John Wiley)

    MATH  Google Scholar 

  • Marchal B 2001XML by example (New Delhi: Prentice Hall of India)

    Google Scholar 

  • Maruyama A, Tamura K, Uramoto N 2000XML and Java (Reading, MA: Addison-Wesley)

    Google Scholar 

  • Minoli E M, Minoli D M 1999Web commerce technology handbook (New Delhi: Tata McGraw Hill)

    Google Scholar 

  • Pardi W J 1999XML in action (Seattle, WA: Microsoft Press)

    Google Scholar 

  • Paulson L D 2001 Copyright ruling generates concern.IEEE Comput. 34(1): 30

    Google Scholar 

  • Rajasekhar T B 1998 Web search engines.Resonance 3(11): 40–53

    Google Scholar 

  • Samuelson P 1999 Why the anticircumvention regulation needs revision.Commun. ACM 42(9): 17–21

    Article  Google Scholar 

  • Sarkar P 2000 A sketch of modern cryptography.Resonance 5(9): 2–40

    Google Scholar 

  • Shim S S Yet al (ed.) 2004 Securing the high speed internet.IEEE Comput. 37(6): 33–67

  • Stafford T F (ed.) 2003 e-Services.Commun. ACM 46(6): 26–67

  • Stallings W 1998Data and computer communications 5th edn (New Delhi: Prentice Hall of India)

    Google Scholar 

  • Stallings W 1999Cryptography and networking security — Principles and practice 2nd (edn) (New Delhi: Prentice Hall of India)

    Google Scholar 

  • Urbaczewski Aet al (eds) 2003 Mobile commerce.Commun. ACM 46(12): 31–65

  • Varshnay V, Vetter R J, Kalakota R 2000 Mobile commerce: A new frontier.IEEE Comput. 33(10): 32–38

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rajaraman, V. Building blocks of e-commerce. Sadhana 30, 89–117 (2005). https://doi.org/10.1007/BF02706240

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02706240

Keywords

Navigation