{"title":"Service Component Architecture for Vending Machine System in Cloud Computing Infrastructure","authors":"Feng-Cheng Lin, Yi-Shiou Lee, Chih-Hao Hsu, Kuan Yu Chen, T. Weng","doi":"10.1109/ICEBE.2009.93","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.93","url":null,"abstract":"This paper proposes a software integration model of service component architecture in the vending industry. We use this architecture to rapidly integrate related services, substantially reduce development costs, establish innovative services, and provide consumers with a brand new experiential shopping environment in retail domain. Meanwhile, we apply a cloud computing technology to solve the following problem: service over loading in a distributed environment. We also discover many issues that will happen with system scaling up in smart store, such as virtual integration, location-based shopping service, personal services, and product optimization. Therefore we use cloud computing to solve these discussed issues. Finally, this paper gives two services as an example to be implemented in the vending industry. The research provides a cloud-based integration system that composes other services easily. The results of this research can increase development speed, and decrease poorly-done work over again and time consumption. It also makes allowance for system stability and scalability.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127322945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Evaluation and Index System Based on IT Enterprise Service Capability","authors":"Z. Fang, Lin Zhao, Zixuan Shao","doi":"10.1109/ICEBE.2009.86","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.86","url":null,"abstract":"With SSME proposed by IBM, It gradually becomes the hot spot about the IT service research. Through to ITIL, CMM, service quality and the service productivity theory research, the article proposed the IT service capability idea, set up IT enterprise service capability evaluation system and analyze it, finally prospected the future researches.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122806489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Credit Cards on Mobile for M-Commerce Payment","authors":"Narongrit Waraporn, Manawat Sithiyavanich, Hathaichanok Jiarawattanasawat, Narin Pakchai","doi":"10.1109/ICEBE.2009.40","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.40","url":null,"abstract":"The number of credit companies has been increasing due to the directed and undirected extra incomes from credit card holders. It effects to rapid growing rate of the number of credit card holders. Each individual is holding many credit cards that are harder to manage than before. At the same time, the usage of gadget devices such as mobiles is rising to the top where everyone carries at least one mobile, especially, every credit card holder. To manage the usage of several credit cards, we proposed the prototype of Virtual Credit Cards (VCC) on mobile phone running on Android platform in our system called Mobile Credit-card with Analytical Transaction (MCAT), an alternative of the existing Point-of-Sale (POS).","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128488026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Analysis and Measurement in Warehouse Financing","authors":"Ying Yin, Zongwei Luo, Yu-lian Fei","doi":"10.1109/ICEBE.2009.74","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.74","url":null,"abstract":"The current financial tsunami makes it difficult for enterprises, especially small and medium enterprises (SME) to ask for loans from banks to finance their future manufacturing activities and business development. Recent years, warehouse financing emerges as an effective and popular means for SMEs to get financing and investment from major banks and large corporations. In addition, it incorporates 3rd party logistics (3PL) who provides professional warehouse and supply chain service. This article identifies and analyzes the risks throughout the warehouse financing process, and gives several evaluating measures of those risks.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"43 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Detection of DDoS Attackers for Large-Scale Networks","authors":"D. Nashat, Xiaohong Jiang, S. Horiguchi","doi":"10.1109/ICEBE.2009.35","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.35","url":null,"abstract":"The Distributed Denial of Service attacks (DDoS) is one of the major threats to network security that exhausts network bandwidth and resources. The current detection schemes are sensitive to the number of attackers and may lead to a high false positive probability especially for largescale networks with huge number of attackers. It is notable, however, that in the current DDoS attacks, the flooding rate is usually distributed among many flooding sources to make the detection more difficult. In this paper we propose a more efficient detection scheme for Web Service DDoS attackers. The proposed scheme is based on the number of incoming requests to the server with the consideration of the clients activity (Active and Non-Active clients during the detection time). To make our scheme scalable to large-Scale networks, the non-adaptive group testing theory is applied to detect attackers using low state overhead. Extensive tracedriven simulation has been conducted on real Web trace to demonstrate the efficiency of the proposed scheme in terms of its false positive, false negative probabilities and also detection time.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agent Modeling and Analysis for E-Commerce Transaction Network Based on CAS Theory","authors":"C. Piao, X. Han, Shu-ren Zhang","doi":"10.1109/ICEBE.2009.18","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.18","url":null,"abstract":"Complex adaptive system (CAS) theory is used to analyze the e-commerce system and the concept of e-commerce transaction network is proposed. The e-commerce transaction network can be viewed as a complex network which is constructed by transaction behaviors between buyers and sellers. Then we give a formal definition of the e-commerce transaction network and establish a multi-agent model for e-commerce transaction network. Based on the transaction rules defined, the agent-based modeling toolkit Repast S is adopted to generate the e-commerce transaction network. The generated network is divided into three 2-mode networks that are buyer-product, seller-product and buyer-seller networks; each of them is transformed into two 1-mode networks respectively. Pajek is used to graphically show the relationships among the agents in the transaction network. The concepts of degree centrality and betweenness centrality in social network analysis are used to analyze the derived 1-mode networks, and the positions of the buyers, sellers and products in the transaction network can be determined visually. Such an approach for analyzing transaction network can be used for knowledge discovery and personalized recommendation in e-commerce.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132959200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology Module Metrics","authors":"Sunju Oh, Joongho Ahn","doi":"10.1109/ICEBE.2009.12","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.12","url":null,"abstract":"In response to an increased need, various methods for ontology modularization have been proposed. However, few studies have focused on evaluative methods for ontology modules. In this study, we devise novel metrics to measure ontology modularity. To evaluate the ontology modules, we introduce cohesion and coupling based on the theory of software metrics. A cohesion metric and two coupling metrics were used to measure cohesion and coupling for ontology modules. These metrics were also designed to check consistency between the ontology modules and the original ontology. The new metrics support a more detailed relationship between classes in ontology modules. We validate the proposed metrics using the well known verification framework and the empirical experiments to complement previous investigations. This study offers ontology engineers valuable criteria with which to evaluate ontology modules and helps ontology users select the qualifying ontology modules.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"33 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133588189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collusion-Resistant Sabotage-Tolerance Mechanisms for Volunteer Computing Systems","authors":"Kanno Watanabe, Masaru Fukushi, S. Horiguchi","doi":"10.1109/ICEBE.2009.36","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.36","url":null,"abstract":"This paper presents a proposal of a collusion-resistant sabotage-tolerance mechanism against malicious sabotage attempts in volunteer computing (VC) systems. While VC systems reach the most powerful computing platforms, they are vulnerable to mischief because volunteers can output erroneous results, for various reasons ranging from hardware failure to intentional sabotage. To protect the integrity of data and validate the computation results, most VC systems rely on the replication-based sabotage-tolerance mechanisms such as the m-first voting. However, these mechanisms are powerless against malicious volunteers (saboteurs) that have intention and use some form of collusion. To face this collusion threat, this paper proposes a spot-checking-based mechanism, which estimates the frequency of malicious attempts and dynamically eliminates erroneous results from the system. Simulation of VCs shows that the proposed method can improve the performance of VC systems up to 30 percent, while guaranteeing the same level of computational correctness.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132103294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Achieving P-Sensitive K-Anonymity via Anatomy","authors":"Xiaoxun Sun, Hua Wang, Jiuyong Li, David Ross","doi":"10.1109/ICEBE.2009.34","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.34","url":null,"abstract":"Privacy-preserving data publishing is to protect sensitive information of individuals in published data while the distortion ratio of the data is minimized. One well-studied approach is the $k$-anonymity model. Recently, several authors have recognized that $k$-anonymity cannot prevent attribute disclosure. To address this privacy threat, one solution would be to employ $p$-sensitive $k$-anonymity, a novel paradigm in relational data privacy, which prevents sensitive attribute disclosure. $p$-sensitive $k$-anonymity partitions the data into groups of records such that each group has at least $p$ distinct sensitive values. Existing approaches for achieving $p$-sensitive $k$-anonymity are mostly generalization-based. In this paper, we propose a novel permutation-based approach called textit{anatomy} to release the quasi-identifier and sensitive values directly in two separate tables. Combined with a grouping mechanism, this approach not only protects privacy, but captures a large amount of correlation in the microdata. We develop a top-down algorithm for computing anatomized tables that obey the $p$-sensitive $k$-anonymity privacy requirement, and minimize the error of reconstructing the microdata. Extensive experiments confirm that textit{anatomy} allows significantly more effective data analysis than the conventional publication methods based on generalization.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincent C. T. Chan, Dickson K. W. Chiu, Michelle Watson, P. Hung, Haiyang Hu, Hua Hu, Yi Zhuang
{"title":"Designing a Credit Approval System Using Web Services, BPEL, and AJAX","authors":"Vincent C. T. Chan, Dickson K. W. Chiu, Michelle Watson, P. Hung, Haiyang Hu, Hua Hu, Yi Zhuang","doi":"10.1109/ICEBE.2009.46","DOIUrl":"https://doi.org/10.1109/ICEBE.2009.46","url":null,"abstract":"In the business world, financial institutions, like banks and investment firms, heavily rely on technology to manipulate daily operations and support business. Many more business processes have now become automated and require procedures to be approved. For example, when providing business services liked personal / corporate loans, mortgage, or Letter of Credit (LC), a customer is required to submit information within their applications; whereas, the service provider has to perform complicated approval procedures, involving different departments or even external parties. In this paper, we discuss how a Credit Approval System (CAS) handles the workflow of such business processes. The system is extensible to contemporary technologies including Business Process Execution Language (BPEL), Asynchronous JavaScript and XML (AJAX), and Java Server Face (JSF) in order to coordinate related parties through the Internet as well as to facilitate the operations and communications with different levels of staff in the Intranet. Our experiences and design characteristics will be further implemented into a system designed for a global financial firm.","PeriodicalId":233830,"journal":{"name":"2009 IEEE International Conference on e-Business Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116987647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}