ABSTRACT

This chapter presents a general methodology for corporations to use to evaluate EC solutions, along with key security technologies necessary to make EC safe. It also discusses the Internet standards organizations that can help corporations evaluate individual security solutions.