Seventh IEEE International Conference on E-Commerce Technology (CEC'05)最新文献

筛选
英文 中文
A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases 企业数据库中透明加密和职责分离的实际实现:防止对数据库的外部和内部攻击
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.9
Ulf T. Mattsson
{"title":"A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases","authors":"Ulf T. Mattsson","doi":"10.1109/ICECT.2005.9","DOIUrl":"https://doi.org/10.1109/ICECT.2005.9","url":null,"abstract":"Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. Instead of building walls around servers or hard drives, a protective layer of encryption is provided around specific sensitive data items or objects. This prevents outside attacks as well as infiltration from within the server itself. This also allows the security administrator to define which data stored in databases are sensitive and thereby focusing the protection only on the sensitive data, which in turn minimizes the delays or burdens on the system that may occur from other bulk encryption methods. Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. We present column-level database encryption as the only solution that is capable of protecting against external and internal threats, and at the same time meeting all regulatory requirements. We use the key concepts of security dictionary, type transparent cryptography and propose solutions on how to transparently store and search encrypted database fields. Different stored data encryption strategies are outlined, so you can decide the best practice for each situation, and each individual field in your database, to handle different security and operating requirements. Application code and database schemas are sensitive to changes in the data type and data length, the paper presents a policy driven solution that allows transparent data level encryption that does not change the data field type or length.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Software piracy prevention through digital rights management systems 通过数字版权管理系统防止软件盗版
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.86
Petar S. Djekic, C. Löbbecke
{"title":"Software piracy prevention through digital rights management systems","authors":"Petar S. Djekic, C. Löbbecke","doi":"10.1109/ICECT.2005.86","DOIUrl":"https://doi.org/10.1109/ICECT.2005.86","url":null,"abstract":"Software publishers use digital rights management, specifically copy-protection techniques, to prevent unauthorized and illegal copying of their software products. Common forms of prevention are copy-protection techniques based on physical tokens. While physical tokens provide better protection from unauthorized copying than intangible ones, the protected digital content becomes unsuitable for online distribution. This paper investigates the role of copy-protection techniques based on physical and intangible tokens in software piracy prevention. An internationally organized online survey among users of sequencer software, a particular kind of music software, provides the data for the subsequent descriptive analysis and logistic regression. Based on our findings, we present the general implications of our results for a software publisher's anti-piracy and online distribution policy.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Electronic contracts in negotiation support systems: challenges, design and implementation 谈判支持系统中的电子合同:挑战、设计和实施
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.41
A. Jertila, M. Schoop
{"title":"Electronic contracts in negotiation support systems: challenges, design and implementation","authors":"A. Jertila, M. Schoop","doi":"10.1109/ICECT.2005.41","DOIUrl":"https://doi.org/10.1109/ICECT.2005.41","url":null,"abstract":"Electronic negotiation support exists place in many facets. Lately, the support of complex electronic negotiations between human negotiators has been researched. While there exist some such support systems (e.g. Inspire or Negoisst), the strong interdependency between the structure of electronic contracts and system support still requires attention. In this paper, we present requirements of electronic contracts based on semantic Web ideas and their implementation in the negotiation support system Negoisst.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cross enterprise business modeling with AC diagrams and workflow patterns 使用AC图和工作流模式进行跨企业业务建模
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.33
Shiow-yang Wu, Kuo-Chang Lin
{"title":"Cross enterprise business modeling with AC diagrams and workflow patterns","authors":"Shiow-yang Wu, Kuo-Chang Lin","doi":"10.1109/ICECT.2005.33","DOIUrl":"https://doi.org/10.1109/ICECT.2005.33","url":null,"abstract":"We proposed a framework for cross enterprise business modeling and workflow automation targeting e-commerce applications. A business process is modeled by using a new visual tool named activity-control diagram (AC diagram). Frequently occurring business procedures are captured by the adoptions of reusable workflow patterns. With formally defined semantics using distributed system theory of happens-before ordering, process behavior can be mechanically analyzed at design time. A completely specified model is automatically converted to a workflow by an iterative traversal algorithm that maps an AC diagram to an XML workflow specification. The spec can then be executed by an XML workflow engine to facilitate cross enterprise ecommerce applications.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130847105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TrustDavis: a non-exploitable online reputation system TrustDavis:一个不可利用的在线声誉系统
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.98
D. DeFigueiredo, Earl T. Barr
{"title":"TrustDavis: a non-exploitable online reputation system","authors":"D. DeFigueiredo, Earl T. Barr","doi":"10.1109/ICECT.2005.98","DOIUrl":"https://doi.org/10.1109/ICECT.2005.98","url":null,"abstract":"We present TrustDavis, an online reputation system that provides insurance against trade fraud by leveraging existing relationships between players, such as the ones present in social networks. Using TrustDavis and a simple strategy, an honest player can set an upper bound on the losses caused by any malicious collusion of players. In addition, TrustDavis incents participants to accurately rate each other, resists participants' pseudonym changes, and is inherently distributed.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127863816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
An automatic electronic contract document signing system in a secure environment 一个安全环境下的自动电子合同文件签署系统
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.18
T. Kwok, Thao Nguyen
{"title":"An automatic electronic contract document signing system in a secure environment","authors":"T. Kwok, Thao Nguyen","doi":"10.1109/ICECT.2005.18","DOIUrl":"https://doi.org/10.1109/ICECT.2005.18","url":null,"abstract":"Superimposing electronic signing data on a signed electronic contract usually involves a large number of complex manual steps. These manual steps are tedious and may cause security faults. In this paper, we present an automatic electronic contract document signing system in a secure environment. The system comprises a document and signature profile module, a signing text template module and a signing information superimposed module. The document and signature profile module parses the contract document and signature information. Based on this information, the signing text template module creates a signing text template with empty text fields. The signing information superimposed module carry out a novel electronic document signing method. This novel method consists of four processing steps: inserting signing text data into empty text fields, converting the text template into an image template, adding signing image data onto the image template, and superimposing the signing image template on the contract document to produce a signed electronic contract document. This automation system has found to improve substantially the efficiency, and at the same time eliminate the potential for human errors and security breaches in signing electronic contract documents.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Integration of business processes with autonomous information systems: a case study in government services 业务流程与自主信息系统的集成:政府服务的案例研究
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.56
J. E. Ferreira, Osvaldo Kotaro Takai, C. Pu
{"title":"Integration of business processes with autonomous information systems: a case study in government services","authors":"J. E. Ferreira, Osvaldo Kotaro Takai, C. Pu","doi":"10.1109/ICECT.2005.56","DOIUrl":"https://doi.org/10.1109/ICECT.2005.56","url":null,"abstract":"This research addresses the problem of business process integration in autonomous information systems. The unified control unit defines the navigation plan for each electronic service requisition belonging to the autonomous information systems. Each electronic service requisition navigates through various levels of consistency rules until it is stored into the specific autonomous database systems. In this paper, we use Riverfish's architecture to unify the business processes in autonomous information systems. This research is illustrated through a case study in government services.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Query-by-object interface for information requirement elicitation in m-commerce 面向移动商务信息需求抽取的按对象查询接口
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1207/s15327590ijhc2002_4
S. A. Rahman, S. Bhalla, Tetsuya Hashimoto
{"title":"Query-by-object interface for information requirement elicitation in m-commerce","authors":"S. A. Rahman, S. Bhalla, Tetsuya Hashimoto","doi":"10.1207/s15327590ijhc2002_4","DOIUrl":"https://doi.org/10.1207/s15327590ijhc2002_4","url":null,"abstract":"Information requirement elicitation (IRE) is essential in wireless Web service to elicit information requirements through interactive choice prompts. We present a design of a high-level user interface for IRE, in the context of 'banking database queries' by a mobile Web user. The prototype is based on the notion of query-by object (QBO) approach of building a query using multiple user-level steps. The test prototype system uses J2ME MIDP for a wireless front end and a J2EE application server and an object-relational database management system (ORDBMS) at the back end. A sample set of queries demonstrate ease of access by the users. Ambiguities in users' intentions are eliminated by virtue of a step-by-step procedure.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126449034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Trustworthy e-mail using secure XML Web services 使用安全XML Web服务的可靠电子邮件
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.99
Steven Taylor, P. Watters
{"title":"Trustworthy e-mail using secure XML Web services","authors":"Steven Taylor, P. Watters","doi":"10.1109/ICECT.2005.99","DOIUrl":"https://doi.org/10.1109/ICECT.2005.99","url":null,"abstract":"The potential for e-mail as a legitimate technology for e-commerce has been hampered by the abuse of open e-mail protocols by senders of unsolicited commercial e-mail. In this paper, we introduce a new e-mail protocol, known as the extensible mail protocol (ExMP), that uses XML Web Services to provide a simple but trustworthy server-server transmission capability. The use of ExMP on mail servers does not require modification to client-side software, reducing the impact on end-users. This paper discusses how ExMP implements trustworthy e-mail to enable future e-commerce systems.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114244934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Profiles for interoperability between MPEG-21 REL and OMA DRM MPEG-21 REL和OMA DRM之间互操作性的概要文件
Seventh IEEE International Conference on E-Commerce Technology (CEC'05) Pub Date : 2005-07-19 DOI: 10.1109/ICECT.2005.69
J. Delgado, J. Prados, E. Rodríguez
{"title":"Profiles for interoperability between MPEG-21 REL and OMA DRM","authors":"J. Delgado, J. Prados, E. Rodríguez","doi":"10.1109/ICECT.2005.69","DOIUrl":"https://doi.org/10.1109/ICECT.2005.69","url":null,"abstract":"One of the key issues for the real deployment of digital rights management (DRM) systems is interoperability. A clear example is at the level of rights expression languages (RELs), where two of them are competing to have a place in the market. On the one hand, MPEG-21 REL is an ISO/IEC official standard, and on the other hand ODRL (open digital rights language) is a REL initiative that has been adopted by the open mobile alliance (OMA), a relevant industrial forum in the area of mobile systems. MPEG-21 REL is more complete, but rather complex; this is why ODRL could be considered in some cases as a more flexible option. In this paper, we analyse a DRM specification from OMA, and try to propose its implementation in an MPEG-21 environment. By defining an MPEG-21 REL DTD and a subset of the MPEG-21 REL authorisation model we are in fact specifying an MPEG-21 REL profile. This approach could simplify the implementation of MPEG-21 REL applications. In order to verify the feasibility of our proposal, we have also implemented some tools that work with both MPEG-21 REL and OMA DRM.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信