电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.130
Jungha Woo, Abhilasha Bhargav-Spantzel, A. Squicciarini, E. Bertino
{"title":"Verification of Receipts from M-commerce Transactions on NFC Cellular Phones","authors":"Jungha Woo, Abhilasha Bhargav-Spantzel, A. Squicciarini, E. Bertino","doi":"10.1109/CECandEEE.2008.130","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.130","url":null,"abstract":"A main challenge in mobile commerce is to make it possible for users to manage their transaction histories from both online e-commerce transactions and in-person transactions. Such histories are typically useful to build credit or to establish trust based on past transactions. In this paper we propose an approach to manage electronic receipts on cellular devices by assuring their secure and privacy-preserving usage. We provide a comprehensive notion of transactions history including both on-line transaction and in-person transactions. We apply cryptographic protocols, such as secret sharing and zero knowledge proofs, in a potentially vulnerable and constrained setting. Specifically, our approach supports flexible strategies based on Shamir's secret sharing to cater to different user requirements and architectural constraints. In addition, aggregate zero knowledge proofs are used to efficiently support proofs of various receipt attributes. We have implemented the system on Nokia NFC cellular phones and report in the paper performance evaluation results.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85567162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.103
Natascha Hoebel, R. Zicari
{"title":"Creating User Profiles of Web Visitors Using Zones, Weights and Actions","authors":"Natascha Hoebel, R. Zicari","doi":"10.1109/CECandEEE.2008.103","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.103","url":null,"abstract":"In this paper, we report our experience in the implementation of a module for creating user profiles of Web visitors by using Zones, Weights and Actions. The module is part of Gugubarra 2.0, a tool for better understanding and management of communities of registered Web visitors, currently being developed by the database group at the Computer Science Institute of the Goethe University in Frankfurt. In addition we introduce a semantic concept for our approach.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77232028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.134
S. Choi, Soo Dong Kim
{"title":"A Quality Model for Evaluating Reusability of Services in SOA","authors":"S. Choi, Soo Dong Kim","doi":"10.1109/CECandEEE.2008.134","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.134","url":null,"abstract":"Service-Oriented Architecture (SOA) is an effective paradigm for publishing common features as services and reusing the published services in building applications. Therefore, reusability of services is a key criterion for evaluating the quality of services. The evaluation target for reusability in our model is the service, applied to both atomic and composite service. Reusability models for conventional paradigms such as OOP and CBD cannot effectively be applied to services in SOA. Hence, there is a high demand for devising a quality model to evaluate service reusability. In this paper, we propose a comprehensive quality model for evaluating reusability of services.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87063102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.142
Yue Zhang, M. Panahi, Kwei-Jay Lin
{"title":"Service Process Composition with QoS and Monitoring Agent Cost Parameters","authors":"Yue Zhang, M. Panahi, Kwei-Jay Lin","doi":"10.1109/CECandEEE.2008.142","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.142","url":null,"abstract":"Service-oriented architecture (SOA) provides a flexible paradigm to dynamically compose service processes from individual services. The flexibility, on the other hand, makes it necessary to monitor and manage service behaviors at runtime for performance assurance. One solution is to deploy software monitoring agents. In this paper, we present an approach to consider agent cost at process composition by selecting services with lower monitoring costs. We propose two algorithms to perform service selection with agent cost. IGA is able to achieve efficient service selection and bounded agent cost by modeling the problem as the weighted set covering (WSC) problem. We also study a heuristic algorithm to estimate the agent cost as part of the service utility function. The execution time of heuristic algorithm is shorter than IGA. On the other hand, the agent cost may not be consistently minimized using heuristic algorithms.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90891541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.133
Chi-Kong Chan, Ho-fung Leung
{"title":"Belief Based Distributed Buyer Coalition Formation with Non-transferable Utility","authors":"Chi-Kong Chan, Ho-fung Leung","doi":"10.1109/CECandEEE.2008.133","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.133","url":null,"abstract":"Online buyer coalition formation problem is an application of e-commerce and distributed agent technology. So far, most works in this topic are social utility based approaches, which assume the agents' utilities to be transferable and publicly known. However, such assumptions are not valid in many software agents applications where agents beliefs are private, and stability is often a more important concept than social utility. In this paper, we study the problem from a private-belief based non-transferable utility approach: instead of social utility maximization, our focus is on achieving stable solutions in term of the core, b-core and Pareto efficiency; instead of assuming common knowledge, we assume the agents' actions to be based on fallible private beliefs. We then propose a distributed mechanism where agents are allowed to propose incremental improvements toward a stable solution. We show by experiment that our mechanism is able to reach core stable solutions in over 97% of the cases, and b-core stable solution in almost of all cases that we tested.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84170091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECANDEEE.2008.125
G. Gangadharan, M. Comerio, Hong Linh Truong, V. D'Andrea, F. D. Paoli, S. Dustdar
{"title":"License-Aware Service Selection","authors":"G. Gangadharan, M. Comerio, Hong Linh Truong, V. D'Andrea, F. D. Paoli, S. Dustdar","doi":"10.1109/CECANDEEE.2008.125","DOIUrl":"https://doi.org/10.1109/CECANDEEE.2008.125","url":null,"abstract":"The distribution of services spanning across organizational boundaries raises problems related to intellectual value that are less explored in current service oriented research. Being a way to manage the intellectual rights between service consumers and service providers, licenses are critical to be considered in services. A service license describes the terms and conditions for the use and access of the service in a machine interpretable way. The proliferation of services that offer similar functionalities requires the selection process to be enhanced together with consideration of licenses. In this paper, we analyze current service licensing practices and present a novel approach for service selection process based on matching the offered licensing specifications (primarily dealing with scope of rights and financial terms) by providers with the requested licensing specifications by consumers.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82204799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1007/978-3-540-92803-4_14
Stefan König, Sebastian Hudert, Torsten Eymann, Mario Paolucci
{"title":"Towards Reputation Enhanced Electronic Negotiations for Service Oriented Computing","authors":"Stefan König, Sebastian Hudert, Torsten Eymann, Mario Paolucci","doi":"10.1007/978-3-540-92803-4_14","DOIUrl":"https://doi.org/10.1007/978-3-540-92803-4_14","url":null,"abstract":"","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81134533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.98
Claus Wonnemann, Jens Strüker
{"title":"Password Management for EPC Class 1 Generation 2 Transponders","authors":"Claus Wonnemann, Jens Strüker","doi":"10.1109/CECandEEE.2008.98","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.98","url":null,"abstract":"RFID systems compliant to the widely-used standard EPC class 1 generation 2 lack effective security mechanisms. We show that passwords used to protect critical functionality can be obtained by attackers with only moderate effort. Since more capable systems are not likely to replace the current standard in the medium term, it is crucial to embed the deployment of RFID technology into IT-ecosystems that ensure a minimization of the potential damage caused by an attack. This objective can be achieved by using transponder-individual passwords. The associated challenge of an efficient and scalable password management remains one of most pressing problems of an enterprise-spanning RFID deployment, however. In this paper, we present two approaches for a password management infrastructure and describe their integration into a retailer's processes.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78863718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.143
M. Stolze
{"title":"Business Process Illustration: Supporting Experience-Grounded Validation of New Business Processes by Subject Matter Experts","authors":"M. Stolze","doi":"10.1109/CECandEEE.2008.143","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.143","url":null,"abstract":"In this experience report we present Business Process Illustration, a technique supporting experience-grounded validation of new business processes by subject matter experts.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85833958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电子商务评论Pub Date : 2008-07-21DOI: 10.1109/CECandEEE.2008.94
Benjamin Blau, Dirk Neumann, Christof Weinhardt, S. Lamparter
{"title":"Planning and Pricing of Service Mashups","authors":"Benjamin Blau, Dirk Neumann, Christof Weinhardt, S. Lamparter","doi":"10.1109/CECandEEE.2008.94","DOIUrl":"https://doi.org/10.1109/CECandEEE.2008.94","url":null,"abstract":"Today's development and provision of commercially used Web services has shifted from providing static and predefined functionality to highly configurable services that can be dynamically combined by customers. This new form of composed services called service mashups integrate functionality of multiple sub-services from decentralized providers. Consequently this leads to a high configuration complexity and presents new challenges in the field of planning and pricing of service offerings such as validation of service configurations as well as price determination. Facing these challenges this paper presents an ontology framework for describing technical as well as economic interdependencies between services and shows how planning and pricing algorithms for dynamic Web scenarios can be implemented. As proof of concept we present the implementation of a service mashup planner and show how this tool can be used to construct complex services considering technical as well as economic service aspects.","PeriodicalId":58336,"journal":{"name":"电子商务评论","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77455209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}