Advanced Mobile Technologies for Secure Transaction Processing - Advances in Wireless Technologies and Telecommunication
Latest Publications


TOTAL DOCUMENTS

5
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781522527596, 9781522527602

In this chapter, we first revisit the basic concepts of database transactions, and discuss how these concepts are achieved in practical systems. Next, we briefly go through the architecture of transaction processing systems in the centralized and the distributed environments. This chapter we have reviewed the basic concepts of database systems and database transactions, and discussed the architecture of transaction processing systems in distributed environments. We will shift our focus to transactions and transaction processing in mobile environments, which possess some unique characteristics such as the mobility of mobile computing hosts, the limitations of wireless communications and the resource constraints of mobile computing devices.


Online transaction payment for the purpose of introducing web-based electronic money as an alternative way of online transaction payment, the main areas that cover in this chapter include research of current payment system, limitation of current payment, what are e-money and the current state of electronic money. It will discuss the proposed web-based electronic money as an alternative for online payment and the benefit of web-based e-money. Online payment transaction is a form of a financial exchange that takes place between the buyer and seller facilitated by means of electronic communications for conducting e-commerce and online purchasing. This chapter includes research of current payment system, limitation of current payment, what are e-money and the current state of electronic money.


When designing a security protocol, it is important firstly to define its security goals. These goals are generally referred to as security services. It is also important to identify the mechanisms which can provide each security service. In this chapter, therefore, we first defined the security services of relevance to this chapter and after that the security mechanisms, which can be used to provide the security services are then examined. In next chapter gives the brief details about Attacks and Authentication for Mobile Banking.


It is important that any new product or service is based on user needs and requirements rather than being driven by technology. This is an important issue to consider with SMS and mobile banking. Research related to the usability design issues surrounding online banking are relevant to SMS banking. Concepts related to authentication, online banking processes, and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. This chapter discussed the concepts related to authentication, online banking processes and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. In next chapter discusses about Web based electronic money for online banking.


The Payment Proxy Server monitors and analyses the content headers in HTML and WML pages moving between the content providers and merchants. Whenever it intercepts priced content it initiates a payment transaction and redirects the user to the Payment Server. Pricing and provisioning of the digital content and the payment service can be done through the administration tools. These tools are also used to monitor the events occurring in the payment server. In this chapter, we describe a system that achieves a secure data transmission over a mobile voice channel with a further goal to provide secure voice transmission. Here we describe each component of the system in detail and discuss the issues that we encountered while building the system.


Sign in / Sign up

Export Citation Format

Share Document