INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 9 NO. 2 2023


Development of an E-Transaction and Information Processing System

Mbagwu Amarachi Austina., Amanze Bethran Chibuike., Agbasonu Valerian Chinedum., Agbakwuru.A. Onyekachi


Abstract


The paper utilized the mandatory access control (MAC) as a security mechanism for the Etransaction processing which involves product ordering, payment using credit card, and product information management. The paper shows how security constraints can be added to the domain model by using mandatory access control (MAC). The system developed created three different access levels which include e-platform administrator, the payment gateway administrator and the customers. Each of the users on the platform has limited access areas and this was achieved by applying mandatory access control technique. Security constraints were added to each of the component patterns to produce a domain model for secure e-commerce. The system is very robust and My-SQL database was used at the back-end.


keywords:

Customers, e-platform administrator, payment gateway administrator


References:


Schutzer, D. (2014). Cyber Security Trends. BITS/Financial Services Roundtable, 3(5), 247-
255.

Geers, K. (2011). From Cambridge to Lisbon: the quest for strategic cyber defense. Journal
of Homeland Security and Emergency Management, 8 (1), 1-16.

Olayemi, O. J. (2014). A Socio-Technological Analysis of Cyber Crime and Cyber Security
in Nigeria. International Journal of Sociology and Anthropology, 6 (3), 116-125.


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo