IJEM Vol. 2, No. 4, 29 Aug. 2012
Cover page and Table of Contents: PDF (size: 160KB)
Proactive security, e-business, network security, passive defense
After giving a brief statement to the theory of proactive security, based on the differences between passive defense and proactive security, the article describes the main idea about the proactive security theory of e-business network from aspects of network environment, security technology and service, network management. At the same time it analyses the barriers existing in the actual use of proactive security in e-business network.
Wu Huanwei,"Proactive Security of E-business", IJEM, vol.2, no.4, pp.49-53, 2012. DOI: 10.5815/ijem.2012.04.06
[1]Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, Francois Spies. A global security architecture for intrusion detection on computer networks[J]. Computers & Security, vol. 27, pp. 30-47, March 2008.
[2]Gunilla Widen-Wulff, Reima Suomi. Utilization of InformationResources for Business Success : The Knowledge Sharing Model [J ] .Information Resources Management ,:pp.46 – 67, 2007, (20).
[3]Huo Guoqing. Enterprise inforrmation integrated management[J]. Journal of the China Society for Scientific and TechnicalInformation, pp.2-9, January 2001 (in Chinese).
[4]Liu Ping. Research on a Management Model of Enterprise InformationResources[J]. Journal of Wuhan University of Technology, pp.:93-95, May 2004 (in Chinese).