Learning digital cashless applications with the consolidation of authenticity, confidentiality and integrity using sequence diagrams

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent surges in e-cashless transactions, attacks and intrusions reflect vulnerabilities in computer networks. Innovative methods and tools can help reinforce defenses, prevent attack propagations, detect and respond to such attacks. We have been experimenting with methods for introducing important concepts related to e-cashless transactions and improving undergraduate curricula and research experiences for Computer Science and Information Systems students. To achieve this goal, sequence diagrams which represent the progression of events over time are introduced to our students. This paper describes a learning module developed to help students understand integration of confidentiality, integrity and authentication into modeling web applications to prevent unscrupulous attacks using the secure electronic transaction protocol [1]. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Herath, A., Herath, S., Kamal, H. Y., Al-Mutawah, K. A., Siddiqui, M. A. R., & Goonatilake, R. (2011). Learning digital cashless applications with the consolidation of authenticity, confidentiality and integrity using sequence diagrams. In Communications in Computer and Information Science (Vol. 154 CCIS, pp. 250–259). https://doi.org/10.1007/978-3-642-21153-9_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free