电子商务评论最新文献

筛选
英文 中文
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones NFC手机移动商务交易收据验证
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.130
Jungha Woo, Abhilasha Bhargav-Spantzel, A. Squicciarini, E. Bertino
{"title":"Verification of Receipts from M-commerce Transactions on NFC Cellular Phones","authors":"Jungha Woo, Abhilasha Bhargav-Spantzel, A. Squicciarini, E. Bertino","doi":"10.1109/CECandEEE.2008.130","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.130","url":null,"abstract":"A main challenge in mobile commerce is to make it possible for users to manage their transaction histories from both online e-commerce transactions and in-person transactions. Such histories are typically useful to build credit or to establish trust based on past transactions. In this paper we propose an approach to manage electronic receipts on cellular devices by assuring their secure and privacy-preserving usage. We provide a comprehensive notion of transactions history including both on-line transaction and in-person transactions. We apply cryptographic protocols, such as secret sharing and zero knowledge proofs, in a potentially vulnerable and constrained setting. Specifically, our approach supports flexible strategies based on Shamir's secret sharing to cater to different user requirements and architectural constraints. In addition, aggregate zero knowledge proofs are used to efficiently support proofs of various receipt attributes. We have implemented the system on Nokia NFC cellular phones and report in the paper performance evaluation results.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85567162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Creating User Profiles of Web Visitors Using Zones, Weights and Actions 使用区域、权重和动作创建Web访问者的用户配置文件
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.103
Natascha Hoebel, R. Zicari
{"title":"Creating User Profiles of Web Visitors Using Zones, Weights and Actions","authors":"Natascha Hoebel, R. Zicari","doi":"10.1109/CECandEEE.2008.103","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.103","url":null,"abstract":"In this paper, we report our experience in the implementation of a module for creating user profiles of Web visitors by using Zones, Weights and Actions. The module is part of Gugubarra 2.0, a tool for better understanding and management of communities of registered Web visitors, currently being developed by the database group at the Computer Science Institute of the Goethe University in Frankfurt. In addition we introduce a semantic concept for our approach.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77232028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Quality Model for Evaluating Reusability of Services in SOA 用于评估SOA中服务可重用性的质量模型
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.134
S. Choi, Soo Dong Kim
{"title":"A Quality Model for Evaluating Reusability of Services in SOA","authors":"S. Choi, Soo Dong Kim","doi":"10.1109/CECandEEE.2008.134","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.134","url":null,"abstract":"Service-Oriented Architecture (SOA) is an effective paradigm for publishing common features as services and reusing the published services in building applications. Therefore, reusability of services is a key criterion for evaluating the quality of services. The evaluation target for reusability in our model is the service, applied to both atomic and composite service. Reusability models for conventional paradigms such as OOP and CBD cannot effectively be applied to services in SOA. Hence, there is a high demand for devising a quality model to evaluate service reusability. In this paper, we propose a comprehensive quality model for evaluating reusability of services.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87063102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Service Process Composition with QoS and Monitoring Agent Cost Parameters 具有QoS和监控代理成本参数的业务流程组合
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.142
Yue Zhang, M. Panahi, Kwei-Jay Lin
{"title":"Service Process Composition with QoS and Monitoring Agent Cost Parameters","authors":"Yue Zhang, M. Panahi, Kwei-Jay Lin","doi":"10.1109/CECandEEE.2008.142","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.142","url":null,"abstract":"Service-oriented architecture (SOA) provides a flexible paradigm to dynamically compose service processes from individual services. The flexibility, on the other hand, makes it necessary to monitor and manage service behaviors at runtime for performance assurance. One solution is to deploy software monitoring agents. In this paper, we present an approach to consider agent cost at process composition by selecting services with lower monitoring costs. We propose two algorithms to perform service selection with agent cost. IGA is able to achieve efficient service selection and bounded agent cost by modeling the problem as the weighted set covering (WSC) problem. We also study a heuristic algorithm to estimate the agent cost as part of the service utility function. The execution time of heuristic algorithm is shorter than IGA. On the other hand, the agent cost may not be consistently minimized using heuristic algorithms.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90891541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Belief Based Distributed Buyer Coalition Formation with Non-transferable Utility 具有不可转让效用的基于信念的分布式买方联盟形成
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.133
Chi-Kong Chan, Ho-fung Leung
{"title":"Belief Based Distributed Buyer Coalition Formation with Non-transferable Utility","authors":"Chi-Kong Chan, Ho-fung Leung","doi":"10.1109/CECandEEE.2008.133","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.133","url":null,"abstract":"Online buyer coalition formation problem is an application of e-commerce and distributed agent technology. So far, most works in this topic are social utility based approaches, which assume the agents' utilities to be transferable and publicly known. However, such assumptions are not valid in many software agents applications where agents beliefs are private, and stability is often a more important concept than social utility. In this paper, we study the problem from a private-belief based non-transferable utility approach: instead of social utility maximization, our focus is on achieving stable solutions in term of the core, b-core and Pareto efficiency; instead of assuming common knowledge, we assume the agents' actions to be based on fallible private beliefs. We then propose a distributed mechanism where agents are allowed to propose incremental improvements toward a stable solution. We show by experiment that our mechanism is able to reach core stable solutions in over 97% of the cases, and b-core stable solution in almost of all cases that we tested.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84170091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
License-Aware Service Selection 支持license的服务选择
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECANDEEE.2008.125
G. Gangadharan, M. Comerio, Hong Linh Truong, V. D'Andrea, F. D. Paoli, S. Dustdar
{"title":"License-Aware Service Selection","authors":"G. Gangadharan, M. Comerio, Hong Linh Truong, V. D'Andrea, F. D. Paoli, S. Dustdar","doi":"10.1109/CECANDEEE.2008.125","DOIUrl":"https://doi.org/10.1109/CECANDEEE.2008.125","url":null,"abstract":"The distribution of services spanning across organizational boundaries raises problems related to intellectual value that are less explored in current service oriented research. Being a way to manage the intellectual rights between service consumers and service providers, licenses are critical to be considered in services. A service license describes the terms and conditions for the use and access of the service in a machine interpretable way. The proliferation of services that offer similar functionalities requires the selection process to be enhanced together with consideration of licenses. In this paper, we analyze current service licensing practices and present a novel approach for service selection process based on matching the offered licensing specifications (primarily dealing with scope of rights and financial terms) by providers with the requested licensing specifications by consumers.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82204799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Reputation Enhanced Electronic Negotiations for Service Oriented Computing 面向服务计算的信誉增强电子谈判
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1007/978-3-540-92803-4_14
Stefan König, Sebastian Hudert, Torsten Eymann, Mario Paolucci
{"title":"Towards Reputation Enhanced Electronic Negotiations for Service Oriented Computing","authors":"Stefan König, Sebastian Hudert, Torsten Eymann, Mario Paolucci","doi":"10.1007/978-3-540-92803-4_14","DOIUrl":"https://doi.org/10.1007/978-3-540-92803-4_14","url":null,"abstract":"","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81134533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Password Management for EPC Class 1 Generation 2 Transponders 密码管理的EPC类1代2转发器
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.98
Claus Wonnemann, Jens Strüker
{"title":"Password Management for EPC Class 1 Generation 2 Transponders","authors":"Claus Wonnemann, Jens Strüker","doi":"10.1109/CECandEEE.2008.98","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.98","url":null,"abstract":"RFID systems compliant to the widely-used standard EPC class 1 generation 2 lack effective security mechanisms. We show that passwords used to protect critical functionality can be obtained by attackers with only moderate effort. Since more capable systems are not likely to replace the current standard in the medium term, it is crucial to embed the deployment of RFID technology into IT-ecosystems that ensure a minimization of the potential damage caused by an attack. This objective can be achieved by using transponder-individual passwords. The associated challenge of an efficient and scalable password management remains one of most pressing problems of an enterprise-spanning RFID deployment, however. In this paper, we present two approaches for a password management infrastructure and describe their integration into a retailer's processes.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78863718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Business Process Illustration: Supporting Experience-Grounded Validation of New Business Processes by Subject Matter Experts 业务流程说明:支持主题专家对新业务流程进行基于经验的验证
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.143
M. Stolze
{"title":"Business Process Illustration: Supporting Experience-Grounded Validation of New Business Processes by Subject Matter Experts","authors":"M. Stolze","doi":"10.1109/CECandEEE.2008.143","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.143","url":null,"abstract":"In this experience report we present Business Process Illustration, a technique supporting experience-grounded validation of new business processes by subject matter experts.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85833958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Planning and Pricing of Service Mashups 服务mashup的计划和定价
电子商务评论 Pub Date : 2008-07-21 DOI: 10.1109/CECandEEE.2008.94
Benjamin Blau, Dirk Neumann, Christof Weinhardt, S. Lamparter
{"title":"Planning and Pricing of Service Mashups","authors":"Benjamin Blau, Dirk Neumann, Christof Weinhardt, S. Lamparter","doi":"10.1109/CECandEEE.2008.94","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.94","url":null,"abstract":"Today's development and provision of commercially used Web services has shifted from providing static and predefined functionality to highly configurable services that can be dynamically combined by customers. This new form of composed services called service mashups integrate functionality of multiple sub-services from decentralized providers. Consequently this leads to a high configuration complexity and presents new challenges in the field of planning and pricing of service offerings such as validation of service configurations as well as price determination. Facing these challenges this paper presents an ontology framework for describing technical as well as economic interdependencies between services and shows how planning and pricing algorithms for dynamic Web scenarios can be implemented. As proof of concept we present the implementation of a service mashup planner and show how this tool can be used to construct complex services considering technical as well as economic service aspects.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77455209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信