{"title":"Mining Web transaction patterns in electronic commerce environment","authors":"Yue-Shi Lee, Show-Jane Yen","doi":"10.1007/978-3-540-72909-9_7","DOIUrl":"https://doi.org/10.1007/978-3-540-72909-9_7","url":null,"abstract":"","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121788751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Work-flow based multi-domain certificate in e-Commerce","authors":"Zhiyi Fang, Yong Feng, Zhuang Liu, J. Zhang","doi":"10.1109/CEC-EAST.2004.75","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.75","url":null,"abstract":"Workflow technology is directly objected to the application of industry and business. In a networked e-Commerce system, network programming brings many threats to whole network, such as spoof of identity, unauthorized access and damage to network. We propose a multidomain certificate mechanism based on work-flow requirements. By using multidomain certificate mechanism, we can provide higher security for authentication and authorization in a networked e-Commerce system","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123605084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A proxy signature scheme with proxy signer's privacy anonymity","authors":"Xiaotong Fu, W. Kou, G. Xiao","doi":"10.1109/CEC-EAST.2004.7","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.7","url":null,"abstract":"A proxy signature scheme is proposed with the property that the proxy signers can sign messages on behalf of the original signer while providing anonymity to protect their privacy. The anonymity can be revoked when it is needed to identify the proxy signer who actually generated the proxy signature. Moreover, the proxy signing power can be recalled according to original signer's need in the scheme","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"2181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extended RBAC model for Web services in business process","authors":"Peng Liu, Zhong Chen","doi":"10.1109/CEC-EAST.2004.17","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.17","url":null,"abstract":"Web services are widely accepted and adopted to provide business functionality in business world. Especially, Web service is chosen to compose business process by companies to achieve their business objectives. Business process contains a set of activities, which represent business interactions between Web services spanning company boundaries. As Web services are built in open distributed environment, it is apt to cause security concerns. Security problems mainly prevent many companies from implementing Web services. This paper proposes an extended RBAC model, called WS-RBAC4BP, to protect Web services in business process. In this model, companies and Web services are considered as subjects and protected objects, respectively. New types of constraints are introduced. Furthermore, the system architecture of WS-RABC4BP is presented. This paper also gives examples to illustrate the model","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semantic publish/subscribe system","authors":"L. Zeng, H. Lei","doi":"10.1109/CEC-EAST.2004.8","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.8","url":null,"abstract":"The publish/subscribe computing paradigm is rapidly gaining momentum due to its capability to integrate loosely coupled applications over the Internet. Existing publish/subscribe systems fall into one of three categories: topic-based, content-based and relational. They all require that the event publishers and subscribers adhere to the same organization of information (i.e., event schema), and route events based on event values only. Such systems are inadequate in heterogeneous and dynamic environments where the event providers and consumers may use different event schemas. In this paper, we present a semantic publish/subscribe system. With our system, the event providers publish events and event consumers define subscription conditions using their respective event schema of choice. Our system uses ontologies to understand the semantics of events, and correlates and maps events using relational operators as part of event brokering","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133927777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business design for an on demand business enterprise","authors":"Hong Cai, Lihua Tang, Ying Huang","doi":"10.1109/CEC-EAST.2004.25","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.25","url":null,"abstract":"Today, enterprises are faced with the challenge of better aligning the IT investment with their strategic direction. This is especially true for CIOs of the enterprises. In this paper, we propose the concept of business design integration that is a systematic approach to vertically integrate a number of business design related activities, ranging from strategy formulation, business redesign, to the redesign of operations environment. It also provides better communication mechanisms for different roles surrounding the CIOs. Role based analysis is critical for our study of business design integration in this paper To illustrate how to realize the proposed approach, we introduce the prototype of business design portal as a tool to facilitate the communication amongst people responsible for various aspects of business design. The approach and associated concepts, prototype tools and methods proposed in this paper could be useful for on demand business transformation in scenarios such as business transformation outsourcing (BTO) and business process outsourcing (BPO)","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intellectual property protection for e-business methods","authors":"Yahong Li","doi":"10.1109/CEC-EAST.2004.42","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.42","url":null,"abstract":"Business methods (BMs) deserve intellectual property law protection. National laws, however, are divergent on whether BMs are patentable. U.S. is a leading country in granting patent to BMs, while Europe and China retain BMs exclusion but allow patent when BMs possess \"technicality\". Unification of laws on BM patenting is much needed, but the feasibility is in great doubt","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"97 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Services security in data service delivery platform for telecom","authors":"Xiulan Yu, Xiaoyan Chen, Xing Fang, Xiaocheng Ding, Bin Zhou, Bing Wei","doi":"10.1109/CEC-EAST.2004.74","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.74","url":null,"abstract":"The major requests for telecom network are efficiency, security, and reliability of service. Data service, running on the telecom network, is a most prominent revenue source for telecom operators. But traditional interface for data service delivery platform cannot completely meet these requirements. Web services, as a promising distributed computing technology, is regarded as the best candidate to design these interfaces. However, whether Web services technology can satisfy the telecom major requirements, especially security request, is still a question for telecom operators. This paper discusses the multiple aspects of Web service security, provides Web service security performance experiment results based on data size and different security policies, and gives suggestions on how to apply Web service security technology to data service delivery platform interface design","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The simulation of service supply chain formation based on mobile agent's searching","authors":"Zhe Yang, Dalu Zhang, Jian Xu","doi":"10.1109/CEC-EAST.2004.66","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.66","url":null,"abstract":"In E-Commerce, end consumers and service suppliers can find the services they needed through the searching of mobile agents (MA). So the suppliers can disassemble the service requests of consumers into the subrequests. Then suppliers respond the subrequests cooperatively. Thus the service supply chain (SSC) can be built up. But the existing bottom-up and up-bottom supply chain formation fashions cannot be adapted to the distributed environment of E-Commerce. So we do some researches on the simulation of SSC formation based on MA 's searching. We describe the service relationship among consumers and suppliers with task dependency network. We study the influence on the formation of SSC caused by the quantities of MA and its variety in number","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"457 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ontology modeling method in semantic composition of Web services","authors":"Juntao Cui, Jiamao Liu, Yujin Wu, Ning Gu","doi":"10.1109/CEC-EAST.2004.20","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.20","url":null,"abstract":"The automatic composition of Web services requires the existing services to be encoded in a semantic form, such as ontology. If Web services are represented with ontology, we can automatic compose Web services by means of their semantics. Ontology modeling is divided into two steps: input/output parameters modeling and Web services modeling. First, we collect Web services' input/output parameters, represent them with classes in ontology, and transform Web services to properties in ontology, define relations between classes and properties. Then we judge Web services' relations based on relations between properties transformed from these Web services and estimate whether these Web services can be composed","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}