2009 International Conference on Management of e-Commerce and e-Government最新文献

筛选
英文 中文
Components Composition Compatibility Checking Based on Behavior Description and Roles Division 基于行为描述和角色划分的组件组合兼容性检查
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.30
Zhang Chi
{"title":"Components Composition Compatibility Checking Based on Behavior Description and Roles Division","authors":"Zhang Chi","doi":"10.1109/ICMECG.2009.30","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.30","url":null,"abstract":"Component-Based Software Development is necessity current of software engineering and industrialization and components achieve interaction by interfaces. At present the main interface definition languages are designed initially for closure environment to satisfy the requirement of C/S application, only describe static syntax level information of component interaction which can not meet the need of understand, usage and deduce of component in open environment. Formal description methods are getting more and more attention because of its accuracy and the use of Automated Theorem proving mechanism. In this paper we proposed the extension approach to component interfaces based on π calculus make them including dynamic behavior information, then divided roles according to the role component acts in the system and researched the compatibility of component composition based on roles division to ensure the correctness of composition and interaction in open environment. To illustrate what we presented we use an Electronic Commerce application system as an example.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123713079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Minimalist Cryptography 改进的极简密码学
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.106
Lifen Jiang, Zhang Li
{"title":"An Improved Minimalist Cryptography","authors":"Lifen Jiang, Zhang Li","doi":"10.1109/ICMECG.2009.106","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.106","url":null,"abstract":"Abstract—Security is one of key problems in RFID application. This research is to find a security algorithm for RFID with very low computing requirement. Minimalist Cryptography only needs exclusive Or (XOR) and simple logical control, and it can protect privacy and provide mutual authentication. However, the algorithm has hidden security problems while assuming that the attacker couldn’t monitor the data between RFID readers and tags for continuous sessions. The paper proved this weakness and put forward three ways to improve the weakness, i.e. channel encryption etc. The attacker could only crack the improved algorithm by brute-force attack. The experimental result showed that even by brute-force attack the attack needs more continues sessions after improvement, the cracking time and the record number needed for cracking increased with improved algorithm, and the cracking difficulty increases exponentially when the length of channel key increases, and the encryption complication increases in liner. The improved Minimalist Cryptography provided a safer lightweight security algorithm for RFID.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Semi-fragile Image Watermarking Resisting to JPEG Compression 一种抗JPEG压缩的半脆弱图像水印
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.31
Xiangqing Wang, Jun Wang, Hong Peng
{"title":"A Semi-fragile Image Watermarking Resisting to JPEG Compression","authors":"Xiangqing Wang, Jun Wang, Hong Peng","doi":"10.1109/ICMECG.2009.31","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.31","url":null,"abstract":"Semi-fragile watermark has attracted attention due to itsimportant role in content authentication for multimedia. In order to distinguish malicious tampering from incidental attacks, semi-fragile watermark must be robust against content-protection image processing. Due to the widely use of JPEG compression, it is always an important subject of semi-fragile watermarking research to improve the performance of anti-JPEG compression under thecondition of maintaining high tempering detection abilities. In this paper, after wavelet high frequency coefficients LH_{2} and HL_{2} are partitioned into coefficient blocks respectively, the energy of each coefficient block is computed. Watermarkinformation is embedded according to the relative coefficient energy relationships. The experimental results show that the proposed algorithm has the advantages such as the objective and subjective image quality assurance, high performance of anti-JPEG compression, larger amount of embedded information, and exact location of malicious attacks.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Classification with Random SPI: Better Models in Uncertain Environment 随机SPI分类:不确定环境下更好的模型
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.32
Yong Qi, Weihua Li, Zhonghua Li
{"title":"A Classification with Random SPI: Better Models in Uncertain Environment","authors":"Yong Qi, Weihua Li, Zhonghua Li","doi":"10.1109/ICMECG.2009.32","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.32","url":null,"abstract":"This paper addresses the problem of learning optimal classifiers that maximally improve the robustness and accuracy in uncertain environment included a large number of noise and missing values. Recent solutions to the efficiently vertex weight evaluation, such as the Bayes Network, rely on statistics methods, without sufficient robust guarantees. We show how a globally optimal solution can be obtained by formulating predicates and statistical training set evaluation in Markov Logic Network. We then propose a classification algorithm which adopts random selection of the instances and features in Random Statistical Predicate Invention (RSPI) classification model. In a set of experiments on UCI datasets about credit card and CRM information we show that the proposed RSPI can achieve significant gains in robustness of model, compared to decision trees algorithms or other random classification methods.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Success Factors for Third-Party Private Logistics Enterprise in the Past and Future 第三方民营物流企业过去与未来的成功因素
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.112
Lei Cheng, Ming Hua, Leina Zheng
{"title":"Success Factors for Third-Party Private Logistics Enterprise in the Past and Future","authors":"Lei Cheng, Ming Hua, Leina Zheng","doi":"10.1109/ICMECG.2009.112","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.112","url":null,"abstract":"Taking 63 private third-party logistics enterprises in Zhejiang Province as samples, the paper makes empirical analysis on their success factors and explains them clearly in hierarchical way by structural model. It finds out: in the dual time structure, the success factors varies from past to future; leadership is always the deepest effect factor; talents are the basis of success. After detailed analysis on the three factors, namely, leadership, HR and degree of informationization, it proposes the suggestions on management: when leaders play the role as parents, they should mobilize the enthusiasm and creativity of his subordinates. In line with morality and humaneness, authority should be used with caution; focus on talent strategy and do a good job in the reserves of professionals and training and management of existing personnel; improve the level of informationization and the management in order to provide clients with timely, accurate, reliable and diversified logistics services.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Norm-Oriented Methodology of E-business 面向规范的电子商务方法论
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.51
Kaiyin Huang, Z. Fang, Yu Zhou
{"title":"Norm-Oriented Methodology of E-business","authors":"Kaiyin Huang, Z. Fang, Yu Zhou","doi":"10.1109/ICMECG.2009.51","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.51","url":null,"abstract":"This paper intends to introduce to method of constructing a theory of organization based on the closely linked concepts of norms and signs. Such a norm-oriented method is well suited in E-business system development, organizational re-engineering and change. The shift of the paradigm from information flow model to information field theory plays in enabling organizations trying to adapt themselves in a world of flux. This is judged by the existence of precise taxonomies, some of which this paper introduces, and improve in business effectiveness.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cost Model and Estimation Methods of Product Configuration Case in MC MC中产品配置案例的成本模型与估算方法
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.57
Xiaoming Wei, Wei Wang
{"title":"The Cost Model and Estimation Methods of Product Configuration Case in MC","authors":"Xiaoming Wei, Wei Wang","doi":"10.1109/ICMECG.2009.57","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.57","url":null,"abstract":"Cost estimation of the product configuration case is the key supporting technology for implementing the mass customization (MC) production. The problems of cost estimation of product configuration case are studied, the cost model of MC production is proposed. The analogy methods are applied to estimate the cost of commonly used variant parts, the feature-based methods are adopted to calculate the manufacturing cost of parts, the engineering cost method is used to estimate the assembly cost, therefore the complexity and lower efficiency of the cost estimation method of variant parts are solved, and the quick and reasonable quotation of the product configuration case is implemented.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Watermarking-Based Host Correlation Detection Scheme 一种基于水印的主机相关性检测方案
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.29
Zheng Pan, Hong Peng, Xianzhong Long, Changle Zhang, Ying Wu
{"title":"A Watermarking-Based Host Correlation Detection Scheme","authors":"Zheng Pan, Hong Peng, Xianzhong Long, Changle Zhang, Ying Wu","doi":"10.1109/ICMECG.2009.29","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.29","url":null,"abstract":"A watermarking-based host correlation detection method is proposedin this paper. The idea is to embed some unique watermark into theflow by slightly adjusting the timing of selected packets in theflow. In the embedding phase, we use network flow groupingstrategy to divide the IPDs (i.e., inter-packet delay) into twodifferent groups randomly, and then realize the watermarkembedding by utilizing the relationship of the average value ofIPDs in different groups. The detection scheme we proposed notonly has the advantage of the timing-based scheme, but also has ahigher robustness against timing perturbation attack.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116106801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Penetration Testing Method for E-Commerce Authentication System Security 电子商务认证系统安全的渗透测试方法
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.111
Wei Pan, Weihua Li
{"title":"A Penetration Testing Method for E-Commerce Authentication System Security","authors":"Wei Pan, Weihua Li","doi":"10.1109/ICMECG.2009.111","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.111","url":null,"abstract":"E-Commerce systems are suffering more and more security issues. Vulnerabilities of authentication systems are revealed when various attacks and malicious abuses are developed and deployed to violate security of system and information. To improve the ability to defend authentication system against invasion and abuse, a novel penetration testing method for E-Commerce authentication system is proposed to scrutinize the vulnerabilities of e-Commerce authentication system and evaluate severity level of potential vulnerabilities. The penetration testing method is an active vulnerability analysis and verification method that can mimic active attacks and perform exploitations by constructing effective and concise penetration testing cases. Through analyzing dynamic taint propagation, the presented method can determine feasibility of the attacks and evaluate security of authentication system. The experiment demonstrates the proposed method can serve as a viable and effective candidate for security detection of authentication system.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Value Creation of Supply Chain Cooperation: Theory with Evidence from Chinese Coal and Power Enterprises 供应链合作的价值创造:基于中国煤电企业的实证理论
2009 International Conference on Management of e-Commerce and e-Government Pub Date : 2009-09-16 DOI: 10.1109/ICMECG.2009.10
Sufang Zhang, Xiaoli Zhao
{"title":"Value Creation of Supply Chain Cooperation: Theory with Evidence from Chinese Coal and Power Enterprises","authors":"Sufang Zhang, Xiaoli Zhao","doi":"10.1109/ICMECG.2009.10","DOIUrl":"https://doi.org/10.1109/ICMECG.2009.10","url":null,"abstract":"This paper presents a theoretical explanation of creating value through supply chain cooperation and tests it with data from the coal and power industries of China. Our theoretical analysis is based upon findings in a number of fields, including transaction cost economics theory, social exchange theory, etc. In addition, an empirical analysis is provided by using data collected through questionnaire. Four specific indicators of supply chain cooperation value and five factors affecting it are put forward. We find that the improvement of relationship, transaction process as well as enterprise capacity significantly influence the market performance of electric power companies. Trust degree, price risk, risk of supply and demand and transaction frequency influence the value of supply chain cooperation, among which trust degree has the most significant impact.","PeriodicalId":252323,"journal":{"name":"2009 International Conference on Management of e-Commerce and e-Government","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126627278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信