Submit your papers Submit Now
International Peer-Reviewed Journal
For Enquiries: editor@iiardjournals.org
📄 Download Paper

Development of an E-Transaction and Information Processing System

Mbagwu Amarachi Austina., Amanze Bethran Chibuike., Agbasonu Valerian Chinedum., Agbakwuru.A. Onyekachi

Abstract

The paper utilized the mandatory access control (MAC) as a security mechanism for the Etransaction processing which involves product ordering, payment using credit card, and product information management. The paper shows how security constraints can be added to the domain model by using mandatory access control (MAC). The system developed created three different access levels which include e-platform administrator, the payment gateway administrator and the customers. Each of the users on the platform has limited access areas and this was achieved by applying mandatory access control technique. Security constraints were added to each of the component patterns to produce a domain model for secure e-commerce. The system is very robust and My-SQL database was used at the back-end.

Keywords

Customers e-platform administrator payment gateway administrator

References

Schutzer, D. (2014). Cyber Security Trends. BITS/Financial Services Roundtable, 3(5), 247-
255.

Geers, K. (2011). From Cambridge to Lisbon: the quest for strategic cyber defense. Journal
of Homeland Security and Emergency Management, 8 (1), 1-16.

Olayemi, O. J. (2014). A Socio-Technological Analysis of Cyber Crime and Cyber Security
in Nigeria. International Journal of Sociology and Anthropology, 6 (3), 116-125.