{"title":"Components Composition Compatibility Checking Based on Behavior Description and Roles Division","authors":"Zhang Chi","doi":"10.1109/ICMECG.2009.30","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.30","url":null,"abstract":"Component-Based Software Development is necessity current of software engineering and industrialization and components achieve interaction by interfaces. At present the main interface definition languages are designed initially for closure environment to satisfy the requirement of C/S application, only describe static syntax level information of component interaction which can not meet the need of understand, usage and deduce of component in open environment. Formal description methods are getting more and more attention because of its accuracy and the use of Automated Theorem proving mechanism. In this paper we proposed the extension approach to component interfaces based on π calculus make them including dynamic behavior information, then divided roles according to the role component acts in the system and researched the compatibility of component composition based on roles division to ensure the correctness of composition and interaction in open environment. To illustrate what we presented we use an Electronic Commerce application system as an example.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Minimalist Cryptography","authors":"Lifen Jiang, Zhang Li","doi":"10.1109/ICMECG.2009.106","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.106","url":null,"abstract":"Abstract—Security is one of key problems in RFID application. This research is to find a security algorithm for RFID with very low computing requirement. Minimalist Cryptography only needs exclusive Or (XOR) and simple logical control, and it can protect privacy and provide mutual authentication. However, the algorithm has hidden security problems while assuming that the attacker couldn’t monitor the data between RFID readers and tags for continuous sessions. The paper proved this weakness and put forward three ways to improve the weakness, i.e. channel encryption etc. The attacker could only crack the improved algorithm by brute-force attack. The experimental result showed that even by brute-force attack the attack needs more continues sessions after improvement, the cracking time and the record number needed for cracking increased with improved algorithm, and the cracking difficulty increases exponentially when the length of channel key increases, and the encryption complication increases in liner. The improved Minimalist Cryptography provided a safer lightweight security algorithm for RFID.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semi-fragile Image Watermarking Resisting to JPEG Compression","authors":"Xiangqing Wang, Jun Wang, Hong Peng","doi":"10.1109/ICMECG.2009.31","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.31","url":null,"abstract":"Semi-fragile watermark has attracted attention due to itsimportant role in content authentication for multimedia. In order to distinguish malicious tampering from incidental attacks, semi-fragile watermark must be robust against content-protection image processing. Due to the widely use of JPEG compression, it is always an important subject of semi-fragile watermarking research to improve the performance of anti-JPEG compression under thecondition of maintaining high tempering detection abilities. In this paper, after wavelet high frequency coefficients LH_{2} and HL_{2} are partitioned into coefficient blocks respectively, the energy of each coefficient block is computed. Watermarkinformation is embedded according to the relative coefficient energy relationships. The experimental results show that the proposed algorithm has the advantages such as the objective and subjective image quality assurance, high performance of anti-JPEG compression, larger amount of embedded information, and exact location of malicious attacks.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Classification with Random SPI: Better Models in Uncertain Environment","authors":"Yong Qi, Weihua Li, Zhonghua Li","doi":"10.1109/ICMECG.2009.32","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.32","url":null,"abstract":"This paper addresses the problem of learning optimal classifiers that maximally improve the robustness and accuracy in uncertain environment included a large number of noise and missing values. Recent solutions to the efficiently vertex weight evaluation, such as the Bayes Network, rely on statistics methods, without sufficient robust guarantees. We show how a globally optimal solution can be obtained by formulating predicates and statistical training set evaluation in Markov Logic Network. We then propose a classification algorithm which adopts random selection of the instances and features in Random Statistical Predicate Invention (RSPI) classification model. In a set of experiments on UCI datasets about credit card and CRM information we show that the proposed RSPI can achieve significant gains in robustness of model, compared to decision trees algorithms or other random classification methods.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Success Factors for Third-Party Private Logistics Enterprise in the Past and Future","authors":"Lei Cheng, Ming Hua, Leina Zheng","doi":"10.1109/ICMECG.2009.112","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.112","url":null,"abstract":"Taking 63 private third-party logistics enterprises in Zhejiang Province as samples, the paper makes empirical analysis on their success factors and explains them clearly in hierarchical way by structural model. It finds out: in the dual time structure, the success factors varies from past to future; leadership is always the deepest effect factor; talents are the basis of success. After detailed analysis on the three factors, namely, leadership, HR and degree of informationization, it proposes the suggestions on management: when leaders play the role as parents, they should mobilize the enthusiasm and creativity of his subordinates. In line with morality and humaneness, authority should be used with caution; focus on talent strategy and do a good job in the reserves of professionals and training and management of existing personnel; improve the level of informationization and the management in order to provide clients with timely, accurate, reliable and diversified logistics services.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Norm-Oriented Methodology of E-business","authors":"Kaiyin Huang, Z. Fang, Yu Zhou","doi":"10.1109/ICMECG.2009.51","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.51","url":null,"abstract":"This paper intends to introduce to method of constructing a theory of organization based on the closely linked concepts of norms and signs. Such a norm-oriented method is well suited in E-business system development, organizational re-engineering and change. The shift of the paradigm from information flow model to information field theory plays in enabling organizations trying to adapt themselves in a world of flux. This is judged by the existence of precise taxonomies, some of which this paper introduces, and improve in business effectiveness.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Cost Model and Estimation Methods of Product Configuration Case in MC","authors":"Xiaoming Wei, Wei Wang","doi":"10.1109/ICMECG.2009.57","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.57","url":null,"abstract":"Cost estimation of the product configuration case is the key supporting technology for implementing the mass customization (MC) production. The problems of cost estimation of product configuration case are studied, the cost model of MC production is proposed. The analogy methods are applied to estimate the cost of commonly used variant parts, the feature-based methods are adopted to calculate the manufacturing cost of parts, the engineering cost method is used to estimate the assembly cost, therefore the complexity and lower efficiency of the cost estimation method of variant parts are solved, and the quick and reasonable quotation of the product configuration case is implemented.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zheng Pan, Hong Peng, Xianzhong Long, Changle Zhang, Ying Wu
{"title":"A Watermarking-Based Host Correlation Detection Scheme","authors":"Zheng Pan, Hong Peng, Xianzhong Long, Changle Zhang, Ying Wu","doi":"10.1109/ICMECG.2009.29","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.29","url":null,"abstract":"A watermarking-based host correlation detection method is proposedin this paper. The idea is to embed some unique watermark into theflow by slightly adjusting the timing of selected packets in theflow. In the embedding phase, we use network flow groupingstrategy to divide the IPDs (i.e., inter-packet delay) into twodifferent groups randomly, and then realize the watermarkembedding by utilizing the relationship of the average value ofIPDs in different groups. The detection scheme we proposed notonly has the advantage of the timing-based scheme, but also has ahigher robustness against timing perturbation attack.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Penetration Testing Method for E-Commerce Authentication System Security","authors":"Wei Pan, Weihua Li","doi":"10.1109/ICMECG.2009.111","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.111","url":null,"abstract":"E-Commerce systems are suffering more and more security issues. Vulnerabilities of authentication systems are revealed when various attacks and malicious abuses are developed and deployed to violate security of system and information. To improve the ability to defend authentication system against invasion and abuse, a novel penetration testing method for E-Commerce authentication system is proposed to scrutinize the vulnerabilities of e-Commerce authentication system and evaluate severity level of potential vulnerabilities. The penetration testing method is an active vulnerability analysis and verification method that can mimic active attacks and perform exploitations by constructing effective and concise penetration testing cases. Through analyzing dynamic taint propagation, the presented method can determine feasibility of the attacks and evaluate security of authentication system. The experiment demonstrates the proposed method can serve as a viable and effective candidate for security detection of authentication system.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Value Creation of Supply Chain Cooperation: Theory with Evidence from Chinese Coal and Power Enterprises","authors":"Sufang Zhang, Xiaoli Zhao","doi":"10.1109/ICMECG.2009.10","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.10","url":null,"abstract":"This paper presents a theoretical explanation of creating value through supply chain cooperation and tests it with data from the coal and power industries of China. Our theoretical analysis is based upon findings in a number of fields, including transaction cost economics theory, social exchange theory, etc. In addition, an empirical analysis is provided by using data collected through questionnaire. Four specific indicators of supply chain cooperation value and five factors affecting it are put forward. We find that the improvement of relationship, transaction process as well as enterprise capacity significantly influence the market performance of electric power companies. Trust degree, price risk, risk of supply and demand and transaction frequency influence the value of supply chain cooperation, among which trust degree has the most significant impact.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126627278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}