IEEE International Conference on E-Commerce Technology for Dynamic E-Business最新文献

筛选
英文 中文
Mining Web transaction patterns in electronic commerce environment 电子商务环境下Web交易模式的挖掘
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1007/978-3-540-72909-9_7
Yue-Shi Lee, Show-Jane Yen
{"title":"Mining Web transaction patterns in electronic commerce environment","authors":"Yue-Shi Lee, Show-Jane Yen","doi":"10.1007/978-3-540-72909-9_7","DOIUrl":"https://doi.org/10.1007/978-3-540-72909-9_7","url":null,"abstract":"","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121788751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Work-flow based multi-domain certificate in e-Commerce 电子商务中基于工作流的多域证书
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.75
Zhiyi Fang, Yong Feng, Zhuang Liu, J. Zhang
{"title":"Work-flow based multi-domain certificate in e-Commerce","authors":"Zhiyi Fang, Yong Feng, Zhuang Liu, J. Zhang","doi":"10.1109/CEC-EAST.2004.75","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.75","url":null,"abstract":"Workflow technology is directly objected to the application of industry and business. In a networked e-Commerce system, network programming brings many threats to whole network, such as spoof of identity, unauthorized access and damage to network. We propose a multidomain certificate mechanism based on work-flow requirements. By using multidomain certificate mechanism, we can provide higher security for authentication and authorization in a networked e-Commerce system","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123605084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A proxy signature scheme with proxy signer's privacy anonymity 一个具有代理签名者隐私匿名性的代理签名方案
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.7
Xiaotong Fu, W. Kou, G. Xiao
{"title":"A proxy signature scheme with proxy signer's privacy anonymity","authors":"Xiaotong Fu, W. Kou, G. Xiao","doi":"10.1109/CEC-EAST.2004.7","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.7","url":null,"abstract":"A proxy signature scheme is proposed with the property that the proxy signers can sign messages on behalf of the original signer while providing anonymity to protect their privacy. The anonymity can be revoked when it is needed to identify the proxy signer who actually generated the proxy signature. Moreover, the proxy signing power can be recalled according to original signer's need in the scheme","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"2181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An extended RBAC model for Web services in business process 业务流程中Web服务的扩展RBAC模型
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.17
Peng Liu, Zhong Chen
{"title":"An extended RBAC model for Web services in business process","authors":"Peng Liu, Zhong Chen","doi":"10.1109/CEC-EAST.2004.17","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.17","url":null,"abstract":"Web services are widely accepted and adopted to provide business functionality in business world. Especially, Web service is chosen to compose business process by companies to achieve their business objectives. Business process contains a set of activities, which represent business interactions between Web services spanning company boundaries. As Web services are built in open distributed environment, it is apt to cause security concerns. Security problems mainly prevent many companies from implementing Web services. This paper proposes an extended RBAC model, called WS-RBAC4BP, to protect Web services in business process. In this model, companies and Web services are considered as subjects and protected objects, respectively. New types of constraints are introduced. Furthermore, the system architecture of WS-RABC4BP is presented. This paper also gives examples to illustrate the model","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134231461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A semantic publish/subscribe system 语义发布/订阅系统
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.8
L. Zeng, H. Lei
{"title":"A semantic publish/subscribe system","authors":"L. Zeng, H. Lei","doi":"10.1109/CEC-EAST.2004.8","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.8","url":null,"abstract":"The publish/subscribe computing paradigm is rapidly gaining momentum due to its capability to integrate loosely coupled applications over the Internet. Existing publish/subscribe systems fall into one of three categories: topic-based, content-based and relational. They all require that the event publishers and subscribers adhere to the same organization of information (i.e., event schema), and route events based on event values only. Such systems are inadequate in heterogeneous and dynamic environments where the event providers and consumers may use different event schemas. In this paper, we present a semantic publish/subscribe system. With our system, the event providers publish events and event consumers define subscription conditions using their respective event schema of choice. Our system uses ontologies to understand the semantics of events, and correlates and maps events using relational operators as part of event brokering","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133927777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Business design for an on demand business enterprise 按需业务企业的业务设计
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.25
Hong Cai, Lihua Tang, Ying Huang
{"title":"Business design for an on demand business enterprise","authors":"Hong Cai, Lihua Tang, Ying Huang","doi":"10.1109/CEC-EAST.2004.25","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.25","url":null,"abstract":"Today, enterprises are faced with the challenge of better aligning the IT investment with their strategic direction. This is especially true for CIOs of the enterprises. In this paper, we propose the concept of business design integration that is a systematic approach to vertically integrate a number of business design related activities, ranging from strategy formulation, business redesign, to the redesign of operations environment. It also provides better communication mechanisms for different roles surrounding the CIOs. Role based analysis is critical for our study of business design integration in this paper To illustrate how to realize the proposed approach, we introduce the prototype of business design portal as a tool to facilitate the communication amongst people responsible for various aspects of business design. The approach and associated concepts, prototype tools and methods proposed in this paper could be useful for on demand business transformation in scenarios such as business transformation outsourcing (BTO) and business process outsourcing (BPO)","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intellectual property protection for e-business methods 电子商务的知识产权保护方法
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.42
Yahong Li
{"title":"Intellectual property protection for e-business methods","authors":"Yahong Li","doi":"10.1109/CEC-EAST.2004.42","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.42","url":null,"abstract":"Business methods (BMs) deserve intellectual property law protection. National laws, however, are divergent on whether BMs are patentable. U.S. is a leading country in granting patent to BMs, while Europe and China retain BMs exclusion but allow patent when BMs possess \"technicality\". Unification of laws on BM patenting is much needed, but the feasibility is in great doubt","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"97 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120868337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web Services security in data service delivery platform for telecom 电信数据业务交付平台中的Web服务安全
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.74
Xiulan Yu, Xiaoyan Chen, Xing Fang, Xiaocheng Ding, Bin Zhou, Bing Wei
{"title":"Web Services security in data service delivery platform for telecom","authors":"Xiulan Yu, Xiaoyan Chen, Xing Fang, Xiaocheng Ding, Bin Zhou, Bing Wei","doi":"10.1109/CEC-EAST.2004.74","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.74","url":null,"abstract":"The major requests for telecom network are efficiency, security, and reliability of service. Data service, running on the telecom network, is a most prominent revenue source for telecom operators. But traditional interface for data service delivery platform cannot completely meet these requirements. Web services, as a promising distributed computing technology, is regarded as the best candidate to design these interfaces. However, whether Web services technology can satisfy the telecom major requirements, especially security request, is still a question for telecom operators. This paper discusses the multiple aspects of Web service security, provides Web service security performance experiment results based on data size and different security policies, and gives suggestions on how to apply Web service security technology to data service delivery platform interface design","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The simulation of service supply chain formation based on mobile agent's searching 基于移动代理搜索的服务供应链形成仿真
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.66
Zhe Yang, Dalu Zhang, Jian Xu
{"title":"The simulation of service supply chain formation based on mobile agent's searching","authors":"Zhe Yang, Dalu Zhang, Jian Xu","doi":"10.1109/CEC-EAST.2004.66","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.66","url":null,"abstract":"In E-Commerce, end consumers and service suppliers can find the services they needed through the searching of mobile agents (MA). So the suppliers can disassemble the service requests of consumers into the subrequests. Then suppliers respond the subrequests cooperatively. Thus the service supply chain (SSC) can be built up. But the existing bottom-up and up-bottom supply chain formation fashions cannot be adapted to the distributed environment of E-Commerce. So we do some researches on the simulation of SSC formation based on MA 's searching. We describe the service relationship among consumers and suppliers with task dependency network. We study the influence on the formation of SSC caused by the quantities of MA and its variety in number","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"457 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An ontology modeling method in semantic composition of Web services Web服务语义组合中的本体建模方法
IEEE International Conference on E-Commerce Technology for Dynamic E-Business Pub Date : 2004-09-13 DOI: 10.1109/CEC-EAST.2004.20
Juntao Cui, Jiamao Liu, Yujin Wu, Ning Gu
{"title":"An ontology modeling method in semantic composition of Web services","authors":"Juntao Cui, Jiamao Liu, Yujin Wu, Ning Gu","doi":"10.1109/CEC-EAST.2004.20","DOIUrl":"https://doi.org/10.1109/CEC-EAST.2004.20","url":null,"abstract":"The automatic composition of Web services requires the existing services to be encoded in a semantic form, such as ontology. If Web services are represented with ontology, we can automatic compose Web services by means of their semantics. Ontology modeling is divided into two steps: input/output parameters modeling and Web services modeling. First, we collect Web services' input/output parameters, represent them with classes in ontology, and transform Web services to properties in ontology, define relations between classes and properties. Then we judge Web services' relations based on relations between properties transformed from these Web services and estimate whether these Web services can be composed","PeriodicalId":433885,"journal":{"name":"IEEE International Conference on E-Commerce Technology for Dynamic E-Business","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信