2008 International Symposium on Electronic Commerce and Security最新文献

筛选
英文 中文
Application Analysis of M-commerce in Digitized Urban Management 移动商务在数字化城市管理中的应用分析
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.127
Guoling Lao, Xinwang Wang
{"title":"Application Analysis of M-commerce in Digitized Urban Management","authors":"Guoling Lao, Xinwang Wang","doi":"10.1109/ISECS.2008.127","DOIUrl":"https://doi.org/10.1109/ISECS.2008.127","url":null,"abstract":"Digitized urban management is a new mode of urban management today, is also an important application field of M-commerce technology. This paper attempts to probe into the application of M-commerce in digitized urban management, beginning with the development of M-commerce technology and the requirement of digitized urban management. With the case of Shenzhen ldquoChengGuanTongrdquo mobile information system, it analyzes the background of the system demand and the system structure. It introduces many system functions such as GIS map, short number cluster network, call restrictions, MPS base station orientation, GPS orientation, SMS information system, IP voice special line in call center, group CRBT, etc.. The paper finally analyzes the implementation effect of the system.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129330841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China 外资企业在华独资经营的特点及对策分析
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.41
Peizhi Wang, Xinying Liu, Wenbo Li
{"title":"Analysis on Features and Countermeasures of Foreign-founded Enterprises' Sole Proprietorship in China","authors":"Peizhi Wang, Xinying Liu, Wenbo Li","doi":"10.1109/ISECS.2008.41","DOIUrl":"https://doi.org/10.1109/ISECS.2008.41","url":null,"abstract":"Since China entered WTO, the policy restrictions in many industries have been gradually loosened or eliminated. The foreign companies have obtained sufficient understanding on China's markets through the long-term grope, as a result, many foreign enterprises begin to step towards sole proprietorship and they gradually expedited their speed. Influences from such a change and trend upon China's economy are presenting themselves gradually. This article is to analyze the evolution of the phenomenon, the features and the unfavorable impacts upon Chinapsilas economy in order to find out the countermeasures.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129058718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Intelligent System based on Web Data Mining 基于Web数据挖掘的信息智能系统
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.192
Shaobo Zhong
{"title":"Information Intelligent System based on Web Data Mining","authors":"Shaobo Zhong","doi":"10.1109/ISECS.2008.192","DOIUrl":"https://doi.org/10.1109/ISECS.2008.192","url":null,"abstract":"How to efficiently use the vast amounts of information on the Web to make the information processing intelligent, personalized and automatic is the most important applications of the current data mining technology. In this paper, Web data mining process is introduced from the view of function, an intelligent mining system of network information is built with combining the data mining and artificial intelligence technologies and the functions of the various subsystems of it are also introduced.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130613648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Multi-Dimensional K-Anonymity Model for Hierarchical Data 层次数据的多维k -匿名模型
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.113
Xiaojun Ye, Lei Jin, Bin Li
{"title":"A Multi-Dimensional K-Anonymity Model for Hierarchical Data","authors":"Xiaojun Ye, Lei Jin, Bin Li","doi":"10.1109/ISECS.2008.113","DOIUrl":"https://doi.org/10.1109/ISECS.2008.113","url":null,"abstract":"For improving the usability of the anonymous result, it is important to comply with the hierarchical structure when generalizing quasi-identifying attributes with hierarchical characteristics. We propose an unrestricted multi-dimensional anonymization model which combines global recoding and local recoding methods. The bottom-up anonymization algorithm with the minimal coverage subgraph constraint and the anonymization metric are proposed. The experiment results justify the effectiveness and scalability of this model.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of Customer Relationship Management Systems Based on Data Mining 基于数据挖掘的客户关系管理系统设计
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.206
Jianhong Zhou, Xie Yi
{"title":"Design of Customer Relationship Management Systems Based on Data Mining","authors":"Jianhong Zhou, Xie Yi","doi":"10.1109/ISECS.2008.206","DOIUrl":"https://doi.org/10.1109/ISECS.2008.206","url":null,"abstract":"As a new type of data processing tool, data mining technology plays an important role in dealing with massive data, transforming data into valuable information, assisting enterprises in effective CRM decision-making and other aspects. On the basis of detailed analysis of the existing CRM structure, a new design scheme of customer relationship management systems based on data mining is presented and the design details of which are illustrated in detail.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent System 将遗留业务应用程序无缝集成到企业业务智能系统的框架
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.190
Jun Yu, Bin Xu
{"title":"A Framework for Seamless Integration of Legacy Business Applications into Enterprise Business Intelligent System","authors":"Jun Yu, Bin Xu","doi":"10.1109/ISECS.2008.190","DOIUrl":"https://doi.org/10.1109/ISECS.2008.190","url":null,"abstract":"To stay competitive, enterprises face the problem to evolve the legacy applications which their core business activities are relying on. Besides, they are expecting an enterprise business intelligent system which help them have more comprehensive knowledge of the factors affecting their business and enable them make better decision-making. This paper introduces a seamless integration solution for the evolving. It may minimize the involved risk of new development, the cost of new application development and related training, and potential risk of losing marketing chance due to some problems in the new deployment.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption 参数调制在混沌加密电子商务安全中的应用
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.38
Zhiming Qu, Tongbin Ma, Yunlong Zhang
{"title":"Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption","authors":"Zhiming Qu, Tongbin Ma, Yunlong Zhang","doi":"10.1109/ISECS.2008.38","DOIUrl":"https://doi.org/10.1109/ISECS.2008.38","url":null,"abstract":"The definition of e-commerce and classification, the distinction between traditional business and e-commerce and the effect of e-commerce on the society and economics are illustrated and discussed. The developing process and status of e-commerce are stated, which makes the rapid developing e-commerce face new challenges. The demand for network security, mechanisms, business needs, risk and technical measures are analyzed in detail. On the basis of chaotic theory, how the chaotic control of encryption for e-commerce is studied and a comprehensive chaotic encryption algorithm is provided. The algorithm can be used to encrypt and decrypt to the transmission of data effectively. Moreover, a discrete chaotic system is simulated and the results show the confidentiality of the encryption method well.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Constructing Algorithm of E-learning Community 一种新的E-learning社区构建算法
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.202
Yi Jiang, Qingling Yue, Zhaogui Qin
{"title":"A Novel Constructing Algorithm of E-learning Community","authors":"Yi Jiang, Qingling Yue, Zhaogui Qin","doi":"10.1109/ISECS.2008.202","DOIUrl":"https://doi.org/10.1109/ISECS.2008.202","url":null,"abstract":"The distance education has tended to cyberization, and how learners study in a collaborative way becomes a key issue. This paper presented a learning communities algorithm based on interest similarity, which can cluster learners with similar interests into the same community and help then collaborative learn. The experiments show that this mechanism can improve efficiency and scalability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116146449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Steganalysis Method Using High-pass Filter for JPEG Image 一种新的JPEG图像高通滤波隐写分析方法
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.120
Han-ling Zhang, Shu-yi Wang
{"title":"A New Steganalysis Method Using High-pass Filter for JPEG Image","authors":"Han-ling Zhang, Shu-yi Wang","doi":"10.1109/ISECS.2008.120","DOIUrl":"https://doi.org/10.1109/ISECS.2008.120","url":null,"abstract":"A new and universal steganalysis scheme for JPEG images was proposed. Moments in frequency domain of wavelet sub-bandpsilas histogram was extracted to analyze the difference of histogram between cover image and stego image, at the same time, used high-pass filter to strengthen the image in order to make the discontinuity among blocks become more obvious, so the extracted block characteristic will be more sensitive to the steganographic action. Then Support Vector Machine (SVM) was used to classify the extracted 40 dimensional feature vectors. The experimental results of 3 popular JPEG steganographic schemes (F5, Outguess and MB1) demonstrate that the proposed scheme has the advantage in detection rate and speed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study on EAI Based on Web Services and SOA 基于Web服务和SOA的EAI研究
2008 International Symposium on Electronic Commerce and Security Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.121
Wu Deng, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li
{"title":"Study on EAI Based on Web Services and SOA","authors":"Wu Deng, Xinhua Yang, Huimin Zhao, Dan Lei, Hua Li","doi":"10.1109/ISECS.2008.121","DOIUrl":"https://doi.org/10.1109/ISECS.2008.121","url":null,"abstract":"With the advent of Web services and SOA (service-oriented architecture), it seems to be feasible to realize EAI (enterprise application integration) and automatic inter-enterprise interactions. This paper combines SOA and Web service technology which simplify the application integration into the development and using of services, solve the connectivity of the isomerous platform, security, and the loose coupling between systems, as well as the refactoring and optimization of the processes. It integrates the isomerous enterprise systems, applications, and business processes and composing application environment of the data sources as a whole system. In addition, the technique standards, such as SOAP, WSDL, BPEL, WDDI, etc., are studied. The various key components of SOA are integrated and implemented. By studying the service-oriented software analyzing and development characteristics, an EAI system with great interoperability, reusability, flexibility is to be realized.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"146 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114058783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信