{"title":"Design of progressive auctions for procurement based on Lagrangian relaxation","authors":"S. Kameshwaran, L. Benyoucef, Xiaolan Xie","doi":"10.1109/ICECT.2005.37","DOIUrl":"https://doi.org/10.1109/ICECT.2005.37","url":null,"abstract":"Auction mechanisms have been found successful in implementing e-procurement, with the buyer as the auctioneer and the sellers as the bidders. Single round auctions are prevalently used in e-procurement, in which the suppliers submit sealed bids in response to the buyer's request-for-quote. The bid evaluation problem faced by the buyer is an optimization problem that selects the winning bids to minimize the cost of procurement. Though these auction types are advantageous in many scenarios, progressive auctions (multiple rounds) are preferred in terms of information elicitation and bid preparation. This paper demonstrates the design of progressive auctions, from their single-round counterparts, using Lagrangian relaxation. In particular, we show that an appropriate algorithm for a judiciously selected Lagrangian relaxation of the bid evaluation problem, can help in designing a progressive auction. The procurement of multiple units of a single item is considered with linear and piecewise linear supply curves.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123822806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating value with interactive pricing mechanisms - a Web service-oriented architecture","authors":"Martin Bernhardt, O. Hinz","doi":"10.1109/ICECT.2005.32","DOIUrl":"https://doi.org/10.1109/ICECT.2005.32","url":null,"abstract":"Lower transaction costs and new possibilities to interact with customers online have led to a plethora of interactive pricing mechanisms on the Internet. While some of these such as various online auction formats stem from the offline world, others such as reverse pricing had previously been unknown. Interactive pricing mechanisms let buyers actively participate in the price discovery and their usage offers sellers a chance to increase sales by means of price discrimination and attraction of new customer segments. Implementation of such pricing functionality however is often time-consuming and costly. Therefore, we propose a Web-Service-oriented architecture enabling sellers to use interactive pricing mechanisms on a scalable basis. All mechanisms can be individually designed for each product to accommodate for different product characteristics and special seller needs.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"963 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123066680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMART - a semantic matchmaking portal for electronic markets","authors":"Sudhir Agarwal, S. Lamparter","doi":"10.1109/ICECT.2005.84","DOIUrl":"https://doi.org/10.1109/ICECT.2005.84","url":null,"abstract":"Searching and comparing products in electronic markets is still a challenging problem. On one hand, the expressive power of the search mechanisms offered by the existing electronic markets is too limited. On the other hand, the price is mostly the only criterium of comparing the results with each other. In this paper, we introduce SMART (semantic matchmaking portal) to improve searching and comparing products in electronic markets. Therefore, we present a novel matchmaking approach based on fuzzy descriptions that provide a more expressive search mechanism that is closer to human reasoning and aggregates multiple search criteria to a single value (ranking of an offer relative to the query), thus enabling better selection of offers that should be considered for the negotiation.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"47 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business rules integration in BPEL - a service-oriented approach","authors":"Florian Rosenberg, S. Dustdar","doi":"10.1109/ICECT.2005.25","DOIUrl":"https://doi.org/10.1109/ICECT.2005.25","url":null,"abstract":"Business rules change quite often. These changes cannot be handled efficiently by representing business rules embedded in the source code of the business logic. Efficient handling of rules that govern ones business is one factor for success. That is where business rules engines play an important role. The service-oriented computing paradigm is becoming more and more popular. Services offered by different providers, are composed to new services by using Web service composition languages such as BPEL. Such process-based composition languages lack the ability to use business rules managed by different business rules engines in the composition process. In this paper, we propose an approach on how to use and integrate business rules in a service-oriented way into BPEL.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115935878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing user privacy in online transactions with X.509 v3 certificate private extensions and smartcards","authors":"Blerim Rexha","doi":"10.1109/ICECT.2005.54","DOIUrl":"https://doi.org/10.1109/ICECT.2005.54","url":null,"abstract":"Security and privacy are central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Public key infrastructure and X.509 certificates have been established as the most trustworthy methods for assuring security in online transactions. This paper proposes a new approach for increasing security by avoiding privacy violation using X.509 version 3 certificate private extensions and storing the certificate and its corresponding private key in the smartcard. The private key never leaves the smartcard and can be used for decryption and signing only after successful personal identification number presentation. The proposed approach is compared with secure electronic transaction (SET) protocol.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supply chain protocolling","authors":"Baolin Wu, M. N. Dewan, Li Li, Yun Yang","doi":"10.1109/ICECT.2005.87","DOIUrl":"https://doi.org/10.1109/ICECT.2005.87","url":null,"abstract":"Faced with the challenges of current e-business powered competitive environments, enterprises now find that it is not adequate to manage their own businesses but also the supply chain. They must be involved in managing the network of the upstream that provides the input, as well as the network of the downstream responsible for the output to the customer. Managing the supply chain has become one of the important issues in today's e-business as the participants span across the network among which the processes and services are independently designed and configured. It is required that a rich variety of interactions must be made available to enable and support the information flows. While several network protocols are currently operating, however, a supply chain protocol owns its specific properties to the business operation that is not supported by the current network protocols. In this paper, we investigate the needs of the supply chain protocol, and propose a novel approach for designing the protocol that brings the business processes and services together to support the supply chain management.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The access-usage-control-matrix: a heuristic tool for implementing a selected level of technical content protection","authors":"Vural Ünlü, T. Hess","doi":"10.1109/ICECT.2005.90","DOIUrl":"https://doi.org/10.1109/ICECT.2005.90","url":null,"abstract":"Content providers are faced with massive intellectual property piracy and resort to technical protection measures encapsulated in digital rights management systems (DRMS). Given the cost-benefit trade-off of varying levels of content protection there is a need to implement a selected level of content protection. Based on a functional reference model of a DRMS, this paper proposes an access-usage-control-matrix to heuristically determine the protective strength of a given DRMS installation. The underlying assumption is that the combined robustness of the preventive security functions access control and usage control determines overall strength. The robustness of both matrix dimensions is refined with concrete authentication and client tamper-resistance methods.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vijayakrishnan Pasupathinathan, J. Pieprzyk, Huaxiong Wang
{"title":"Privacy enhanced electronic cheque system","authors":"Vijayakrishnan Pasupathinathan, J. Pieprzyk, Huaxiong Wang","doi":"10.1109/ICECT.2005.68","DOIUrl":"https://doi.org/10.1109/ICECT.2005.68","url":null,"abstract":"With the introduction of Check 21 law and the development of FSTC's echeck system, there has been an increasing usage of e-cheque conversions and acceptance among retailers, banks, and consumers. However, the current e-cheque system does not address issues concerning privacy, confidentiality, and traceability. We highlight the issues concerning the current electronic cheque system and provide a solution to overcome those drawbacks.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards generic low payment mechanisms for decentralized task allocation: a learning based approach","authors":"A. Ronen, Rina Talisman","doi":"10.1109/ICECT.2005.96","DOIUrl":"https://doi.org/10.1109/ICECT.2005.96","url":null,"abstract":"We study the problem of procuring a cheap path in a disjoint path graph in which the edges belong to self interested agents. A wide range of task allocation problems can be reduced to this problem by Artur Czumaj and Amir Ronen (2004). Motivated by recent negative results regarding incentive compatible mechanisms for the problem, our focus is on non incentive compatible mechanisms. Such mechanisms have both good and bad equilibria and therefore it is not clear how to analyze them. In this paper we take first steps towards the construction of generic low payment mechanisms for task allocation. We focus on simple mechanisms conveying minimal amount of information to the agents. By simulation, we investigate the behavior of the agents during repeated executions of the mechanism. We study three adaptive strategies for the agents, each represents a different learning approach. Our goal is to pinpoint phenomena which are consistent across all three types of strategies. We demonstrate that it may be possible to achieve long range payments overwhelmingly smaller than the payments of incentive compatible mechanisms. Several recommendations which facilitate obtaining low payments along with advises for avoiding pitfalls are given in the paper.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132170647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Apostolopoulos, Ilias S. Kapetanakis, G. Oikonomou
{"title":"An architecture for the management of smart cards by mobile devices using Java technologies","authors":"T. Apostolopoulos, Ilias S. Kapetanakis, G. Oikonomou","doi":"10.1109/ICECT.2005.16","DOIUrl":"https://doi.org/10.1109/ICECT.2005.16","url":null,"abstract":"Smart cards are cards with memory and a processor, ideal for authentication and secure applications. Mobile devices have an extraordinary spread; people carry them along at all times. The ability to combine the features of those two devices is quite compelling. We used technologies of the Java family in order to achieve this. In our work, we designed an architecture for the management of smart cards by mobile devices. The system is built up from three components, the Java card applet, the mobile application and the Java card-mobile device gateway. For the purposes of our work and as proof of concept, we developed a sample electronic wallet application. Finally, we extended the proposed system's functionality and described a business case, where the system could be used in the future.","PeriodicalId":312957,"journal":{"name":"Seventh IEEE International Conference on E-Commerce Technology (CEC'05)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}