首页 > 最新文献

2008 Third International Conference on Internet and Web Applications and Services最新文献

英文 中文
Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments 动态分布式计算环境下高效服务供给的信任管理框架
M. Louta, A. Michalas
In dynamic distributed computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving their own goals and aims, entities may misbehave (intentionally or unintentionally), thus, leading to a significant deterioration of system's performance. In this study, a reputation mechanism is proposed which helps estimating SRPs trustworthiness and predicting their future behaviour, taking into account their past performance in consistently satisfying SRRs' expectations. The reputation mechanism is distributed, considers both first-hand information (acquired from the SRR's direct past experiences with the SRPs) and second-hand information (disseminated from other SRRs' past experiences with the SRPs), while it exhibits a robust behaviour against inaccurate reputation ratings.
在动态分布式计算环境中,系统实体可以分为原则上相互冲突的两大类。它们是希望使用服务和/或利用其他系统实体和提供所请求的服务/资源的服务资源提供者提供的资源的服务资源请求者(srr)。实体在实现自身目标和目的的同时,追求自身福利的最大化,可能会有意或无意地行为不当,从而导致系统性能的显著恶化。在本研究中,提出了一种声誉机制,该机制有助于估计srp的可信度并预测他们未来的行为,考虑到他们过去的表现是否始终满足srr的期望。声誉机制是分布式的,考虑了第一手信息(从SRR过去与srp的直接经验中获得)和二手信息(从其他SRR过去与srp的经验中传播),同时它对不准确的声誉评级表现出强大的行为。
{"title":"Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments","authors":"M. Louta, A. Michalas","doi":"10.1109/ICIW.2008.44","DOIUrl":"https://doi.org/10.1109/ICIW.2008.44","url":null,"abstract":"In dynamic distributed computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving their own goals and aims, entities may misbehave (intentionally or unintentionally), thus, leading to a significant deterioration of system's performance. In this study, a reputation mechanism is proposed which helps estimating SRPs trustworthiness and predicting their future behaviour, taking into account their past performance in consistently satisfying SRRs' expectations. The reputation mechanism is distributed, considers both first-hand information (acquired from the SRR's direct past experiences with the SRPs) and second-hand information (disseminated from other SRRs' past experiences with the SRPs), while it exhibits a robust behaviour against inaccurate reputation ratings.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
U-Training. A Framework to Create Ubiquitous Training Portals for Higher Education Teachers U-Training。为高等教育教师创建无处不在的培训门户的框架
Oscar Díaz-Alcántara
This project outlines some teacher training strategies using the information and communication technologies (ICTs) to contribute to sustainable higher educational training programmes and their role in the shift towards ubiquitous training environments. The Corporate E-Learning Centre (CELC), at Anahuac Mexico Sur University, has made some efforts to implement different approaches for training teachers in ICTs. The first approach consisted of training teachers in the collaborative learning strategy using the technology tools of a learning management system. The second approach consisted of personalised training in a controlled space and with specific tools for teachers courses. This second approach was concluded with the creation of a laboratory called CEIC lab, which has an ergonomic-didactic layout. The third approach is described in this project and unites the experiences and results of the previous two approaches. This third approach called u-training combines instructional design, e-commerce, marketing, ICTs, a metric control programme and a reward management programme to create a ubiquitous training portal so that teacher training can be available anywhere and anytime.
本项目概述了一些利用信息通信技术促进可持续高等教育培训计划的教师培训战略,以及信息通信技术在向普及培训环境转变中的作用。墨西哥南阿纳瓦克大学(Anahuac Mexico Sur University)的企业电子学习中心(CELC)已努力实施不同的方法来培训教师使用ict。第一种方法包括使用学习管理系统的技术工具对教师进行协作学习策略的培训。第二种方法包括在一个受控空间进行个性化培训,并为教师课程提供特定工具。第二种方法是建立一个名为CEIC实验室的实验室,该实验室具有人体工程学教学布局。本项目描述了第三种方法,并将前两种方法的经验和结果结合起来。第三种方法称为u-training,它结合了教学设计、电子商务、营销、信息通信技术、度量控制方案和奖励管理方案,创建了一个无处不在的培训门户,以便随时随地提供教师培训。
{"title":"U-Training. A Framework to Create Ubiquitous Training Portals for Higher Education Teachers","authors":"Oscar Díaz-Alcántara","doi":"10.1109/ICIW.2008.27","DOIUrl":"https://doi.org/10.1109/ICIW.2008.27","url":null,"abstract":"This project outlines some teacher training strategies using the information and communication technologies (ICTs) to contribute to sustainable higher educational training programmes and their role in the shift towards ubiquitous training environments. The Corporate E-Learning Centre (CELC), at Anahuac Mexico Sur University, has made some efforts to implement different approaches for training teachers in ICTs. The first approach consisted of training teachers in the collaborative learning strategy using the technology tools of a learning management system. The second approach consisted of personalised training in a controlled space and with specific tools for teachers courses. This second approach was concluded with the creation of a laboratory called CEIC lab, which has an ergonomic-didactic layout. The third approach is described in this project and unites the experiences and results of the previous two approaches. This third approach called u-training combines instructional design, e-commerce, marketing, ICTs, a metric control programme and a reward management programme to create a ubiquitous training portal so that teacher training can be available anywhere and anytime.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices 移动设备P2P激励机制的安全性分析
Jani Suomalainen, Anssi Pehrsson, J. Nurminen
Peer-to-peer applications are emerging into mobile devices. However, resource limitations of these devices introduce new challenges for P2P technologies. For instance, there is a need for incentive mechanisms, which address the free riding problem but do not waste devices' battery or communication resources. A centralized and user-identity based incentive mechanism enables mobile users to contribute with any device and receive P2P services with mobile devices. We explore security issues related to a centralized incentive mechanism by analyzing and classifying threats and potential security mechanisms. We propose a privacy preserving security architecture. The architecture is based on authentication, software tamper protection, and misbehavior detection mechanisms. Further, we provide a discussion on potential security compromises, not jeopardizing sufficient security level, and describe a prototype implementation for mobile BitTorrent file sharing peers.
点对点应用程序正在移动设备中兴起。然而,这些设备的资源限制给P2P技术带来了新的挑战。例如,有必要建立激励机制,解决搭便车问题,但不浪费设备的电池或通信资源。集中的、基于用户身份的激励机制使得移动用户可以使用任何设备进行贡献,并使用移动设备接受P2P服务。我们通过分析和分类威胁和潜在的安全机制来探讨与集中激励机制相关的安全问题。我们提出了一种保护隐私的安全架构。该体系结构基于身份验证、软件篡改保护和错误行为检测机制。此外,我们提供了一个潜在的安全妥协的讨论,不危及足够的安全级别,并描述了移动bt文件共享对等体的原型实现。
{"title":"A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices","authors":"Jani Suomalainen, Anssi Pehrsson, J. Nurminen","doi":"10.1109/ICIW.2008.116","DOIUrl":"https://doi.org/10.1109/ICIW.2008.116","url":null,"abstract":"Peer-to-peer applications are emerging into mobile devices. However, resource limitations of these devices introduce new challenges for P2P technologies. For instance, there is a need for incentive mechanisms, which address the free riding problem but do not waste devices' battery or communication resources. A centralized and user-identity based incentive mechanism enables mobile users to contribute with any device and receive P2P services with mobile devices. We explore security issues related to a centralized incentive mechanism by analyzing and classifying threats and potential security mechanisms. We propose a privacy preserving security architecture. The architecture is based on authentication, software tamper protection, and misbehavior detection mechanisms. Further, we provide a discussion on potential security compromises, not jeopardizing sufficient security level, and describe a prototype implementation for mobile BitTorrent file sharing peers.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Web Application to Generate Route Bus Timetables 生成路线巴士时刻表的Web应用程序
K. Toshioka, T. Kawamura, K. Sugahara
Bus route system is the fundamental transportation device for aged people and students, and has an important role in every province. However, passengers decreases year by year, therefore the authors have developed the shortest path searching system called "BUS-NET" as a web application to sustain the public transport. Here, we take up generation of timetables. In general, timetable generation is considered as a very simple problem. However, there are some difficult problems. Firstly, bus stops of the same name are managed as one bus stop in the database of our system on grounds that error and cost decrease. Therefore, when timetables are generated, such bus stops must be distinguished. Secondly, there are so many bus stops in the timetables of bus route. However, all of them are not needed for an individual user in most cases. Thus, some bus stops may be excluded when a user intends to obtain a timetable of a bus route. In this paper, the authors report on the algorithms to solve those problems and the implementations, experiments of the functions.
公交线路系统是老年人和学生的基本交通工具,在各省都有着重要的作用。然而,乘客数量逐年减少,因此,作者开发了最短路径搜索系统BUS-NET作为一个web应用程序来维持公共交通。在这里,我们以生成时间表为例。一般来说,时间表的生成被认为是一个非常简单的问题。然而,也有一些难题。首先,基于减少误差和降低成本的考虑,在系统数据库中将多个同名公交站点作为一个公交站点进行管理。因此,在生成时刻表时,必须区分这些公交站点。其次,公交路线的时间表上有太多的公交车站。但是,在大多数情况下,单个用户并不需要所有这些工具。因此,当用户想要获取公交路线的时刻表时,可能会排除一些公交站点。在本文中,作者报告了解决这些问题的算法以及函数的实现和实验。
{"title":"Web Application to Generate Route Bus Timetables","authors":"K. Toshioka, T. Kawamura, K. Sugahara","doi":"10.1109/ICIW.2008.75","DOIUrl":"https://doi.org/10.1109/ICIW.2008.75","url":null,"abstract":"Bus route system is the fundamental transportation device for aged people and students, and has an important role in every province. However, passengers decreases year by year, therefore the authors have developed the shortest path searching system called \"BUS-NET\" as a web application to sustain the public transport. Here, we take up generation of timetables. In general, timetable generation is considered as a very simple problem. However, there are some difficult problems. Firstly, bus stops of the same name are managed as one bus stop in the database of our system on grounds that error and cost decrease. Therefore, when timetables are generated, such bus stops must be distinguished. Secondly, there are so many bus stops in the timetables of bus route. However, all of them are not needed for an individual user in most cases. Thus, some bus stops may be excluded when a user intends to obtain a timetable of a bus route. In this paper, the authors report on the algorithms to solve those problems and the implementations, experiments of the functions.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing Web Service Performance by Replication at the Operating System Level 在操作系统级别通过复制处理Web服务性能
V. Stantchev, M. Malek
This paper evaluates replication possibilities for Web services at the operating system level and how they affect Web service performance. This is done in the context of architectural translucency - an approach that defines layers in a service-oriented architecture and states that similar measures have different implications on nonfunctional properties when applied at different layers in different ways. The observed layer here is the operating system. The work presents current request processing techniques and how they are implemented in a typical platform for Web services (Windows Server 2003, IIS and .NET). It then proposes two ways to replicate Web services - per-process replication and per-thread replication and techniques to configure them on the selected platform. The case study demonstrates the feasibility of the concept with performance advantages of up to 50%.
本文评估了操作系统级别上Web服务的复制可能性,以及它们如何影响Web服务性能。这是在体系结构半透明的上下文中完成的——这种方法在面向服务的体系结构中定义层,并声明当以不同的方式应用于不同的层时,类似的度量对非功能属性有不同的含义。这里观察的层是操作系统。本书介绍了当前的请求处理技术,以及如何在典型的Web服务平台(Windows Server 2003、IIS和. net)中实现这些技术。然后提出了两种复制Web服务的方法——每进程复制和每线程复制,以及在所选平台上配置它们的技术。案例研究证明了该概念的可行性,性能优势高达50%。
{"title":"Addressing Web Service Performance by Replication at the Operating System Level","authors":"V. Stantchev, M. Malek","doi":"10.1109/ICIW.2008.113","DOIUrl":"https://doi.org/10.1109/ICIW.2008.113","url":null,"abstract":"This paper evaluates replication possibilities for Web services at the operating system level and how they affect Web service performance. This is done in the context of architectural translucency - an approach that defines layers in a service-oriented architecture and states that similar measures have different implications on nonfunctional properties when applied at different layers in different ways. The observed layer here is the operating system. The work presents current request processing techniques and how they are implemented in a typical platform for Web services (Windows Server 2003, IIS and .NET). It then proposes two ways to replicate Web services - per-process replication and per-thread replication and techniques to configure them on the selected platform. The case study demonstrates the feasibility of the concept with performance advantages of up to 50%.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Dynamic Voice Portal for Delivery of Cultural Content 提供文化内容的动态语音门户
Evangelia Boufardea, J. Garofalakis, A. Plessas
Many companies today are providing customer services via the Web and the telephone. Demand for providing Web data in audio form is increasing every day. Voice response facilities are used for various kinds of information over the phone: time, weather, horoscopes, lottery results, sports events, news, etc. VoiceXML is an enabling technology for creating a streamlined speech-based interface for web-based information services. Speech technology, as it improves, will become a very natural and powerful interface for ubiquitous access to information. Moreover, VoiceXML applications are available through computers or through the telephone, which is a universal means of communication. In this paper, we describe a dynamic speech-enabled system powered by VoiceXML in which the available information is dynamically generated by PHP.
今天许多公司都通过网络和电话提供客户服务。以音频形式提供Web数据的需求与日俱增。语音应答设备用于电话上的各种信息:时间、天气、星座、彩票结果、体育赛事、新闻等。VoiceXML是一种支持技术,用于为基于web的信息服务创建流线型的基于语音的界面。随着语音技术的进步,它将成为一种非常自然和强大的接口,用于无处不在的信息访问。此外,VoiceXML应用程序可以通过计算机或电话使用,这是一种通用的通信方式。在本文中,我们描述了一个由VoiceXML提供支持的动态语音系统,其中可用信息由PHP动态生成。
{"title":"A Dynamic Voice Portal for Delivery of Cultural Content","authors":"Evangelia Boufardea, J. Garofalakis, A. Plessas","doi":"10.1109/ICIW.2008.90","DOIUrl":"https://doi.org/10.1109/ICIW.2008.90","url":null,"abstract":"Many companies today are providing customer services via the Web and the telephone. Demand for providing Web data in audio form is increasing every day. Voice response facilities are used for various kinds of information over the phone: time, weather, horoscopes, lottery results, sports events, news, etc. VoiceXML is an enabling technology for creating a streamlined speech-based interface for web-based information services. Speech technology, as it improves, will become a very natural and powerful interface for ubiquitous access to information. Moreover, VoiceXML applications are available through computers or through the telephone, which is a universal means of communication. In this paper, we describe a dynamic speech-enabled system powered by VoiceXML in which the available information is dynamically generated by PHP.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Repository and Data Layer in Hyperbook System Using XML RDBS 基于XML RDBS的Hyperbook系统中的数据存储库和数据层
Abdoulmajid Hakki, A. Kaarna
In this paper we consider the use of XML technology for the data repository and data layer in the Hyperbook system. We propose the Hyperbook data layer (HBDL) for Hyperbook data repository using RDBMS. In HBDL the transformation technique from XML to relational data is the schema independent. The approach observes an XML file as consisting of terms of hierarchical data structure. Each node of data is made up of label and data fields. Each node is converted to a record in a relational table.
本文考虑在Hyperbook系统中使用XML技术作为数据存储库和数据层。我们提出了Hyperbook数据层(HBDL),用于使用RDBMS的Hyperbook数据存储库。在HBDL中,从XML到关系数据的转换技术是模式独立的。该方法将XML文件视为由分层数据结构的术语组成。数据的每个节点由标签和数据字段组成。每个节点被转换为关系表中的一条记录。
{"title":"Data Repository and Data Layer in Hyperbook System Using XML RDBS","authors":"Abdoulmajid Hakki, A. Kaarna","doi":"10.1109/ICIW.2008.92","DOIUrl":"https://doi.org/10.1109/ICIW.2008.92","url":null,"abstract":"In this paper we consider the use of XML technology for the data repository and data layer in the Hyperbook system. We propose the Hyperbook data layer (HBDL) for Hyperbook data repository using RDBMS. In HBDL the transformation technique from XML to relational data is the schema independent. The approach observes an XML file as consisting of terms of hierarchical data structure. Each node of data is made up of label and data fields. Each node is converted to a record in a relational table.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Episodes and Workflow Integration: A Use Case in LD-CAST 业务片断和工作流集成:LD-CAST中的一个用例
D. Karagiannis, R. Woitsch, W. Utz, Vedran Hrgovcic, H. Eichner
The integration of the business and technical views allows domain experts from the business view to take control over the whole process of service delivery (including the generation of the executable workflows) to the end users. The integration approach of business and technical views presented in this paper is supported by semi-automatic generation of ontology from the modeled business episodes. This approach is evaluated and presented through the use case example from the LD-CAST project (FP6-ICT-26919).
业务视图和技术视图的集成允许来自业务视图的领域专家控制向最终用户交付服务的整个过程(包括可执行工作流的生成)。本文提出的业务视图和技术视图的集成方法是由建模业务事件的本体半自动生成支持的。通过LD-CAST项目(FP6-ICT-26919)的用例示例对该方法进行了评估和介绍。
{"title":"Business Episodes and Workflow Integration: A Use Case in LD-CAST","authors":"D. Karagiannis, R. Woitsch, W. Utz, Vedran Hrgovcic, H. Eichner","doi":"10.1109/ICIW.2008.88","DOIUrl":"https://doi.org/10.1109/ICIW.2008.88","url":null,"abstract":"The integration of the business and technical views allows domain experts from the business view to take control over the whole process of service delivery (including the generation of the executable workflows) to the end users. The integration approach of business and technical views presented in this paper is supported by semi-automatic generation of ontology from the modeled business episodes. This approach is evaluated and presented through the use case example from the LD-CAST project (FP6-ICT-26919).","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On Secure and Anonymous Buyer-Seller Watermarking Protocol 安全匿名买卖水印协议研究
Mina Deng, B. Preneel
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after purchase activities in e-commerce. In this paper, we analyze the security of some previously proposed protocols, and propose a secure and anonymous buyer-seller watermarking protocol. In contrast to early work, our improvement on the protocol's security properties ensures that the design requirements are fulfilled. The proposed protocol is able to simultaneously solve the piracy tracing problem, the customer's rights problem, the unbinding problem, the anonymity problem, the conspiracy problem, and the dispute problem. In the proposed protocol, a buyer can purchase digital contents anonymously but his anonymity can be revoked as soon as he is adjudicated to be guilty by a legal institute, such as civil court.
买卖双方水印协议将数字水印与密码学相结合,以保护电子商务中买卖双方在购买活动之前、期间和之后的数字版权和隐私权。本文在分析了现有协议安全性的基础上,提出了一种安全、匿名的买卖双方水印协议。与早期的工作相比,我们对协议安全属性的改进确保了设计需求的满足。该协议能够同时解决盗版跟踪问题、用户权益问题、解绑定问题、匿名问题、合谋问题和纠纷问题。在提议的协议中,买家可以匿名购买数字内容,但一旦被民事法院等法律机构裁定有罪,他的匿名性就会被撤销。
{"title":"On Secure and Anonymous Buyer-Seller Watermarking Protocol","authors":"Mina Deng, B. Preneel","doi":"10.1109/ICIW.2008.28","DOIUrl":"https://doi.org/10.1109/ICIW.2008.28","url":null,"abstract":"Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after purchase activities in e-commerce. In this paper, we analyze the security of some previously proposed protocols, and propose a secure and anonymous buyer-seller watermarking protocol. In contrast to early work, our improvement on the protocol's security properties ensures that the design requirements are fulfilled. The proposed protocol is able to simultaneously solve the piracy tracing problem, the customer's rights problem, the unbinding problem, the anonymity problem, the conspiracy problem, and the dispute problem. In the proposed protocol, a buyer can purchase digital contents anonymously but his anonymity can be revoked as soon as he is adjudicated to be guilty by a legal institute, such as civil court.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Checkable Domain Management with Ontology and Rules 带有本体和规则的可检查域管理
Atif Alvi, D. Greaves
Control of pervasive computing environments is a well- known problem. Such management has to tackle issues of heterogeneity, dynamic binding, interoperability, security, and scalability, among others. The approach used in our AutoHAN home automation system is presented here. It employs a high-level rule-based control atop an ontological substrate, interacting with an application-level layer of rules. This design allows formalised representation of a domain, which lends itself to checkability, along with its reliable control. We discuss the implementation and characteristics of our approach.
普适计算环境的控制是一个众所周知的问题。这样的管理必须处理异构性、动态绑定、互操作性、安全性和可伸缩性等问题。本文介绍了AutoHAN家庭自动化系统中使用的方法。它在本体基板上采用基于高级规则的控制,并与应用程序级规则层进行交互。这种设计允许对领域进行形式化的表示,从而使其具有可检查性,并具有可靠的控制。我们讨论了我们的方法的实现和特点。
{"title":"Checkable Domain Management with Ontology and Rules","authors":"Atif Alvi, D. Greaves","doi":"10.1109/ICIW.2008.65","DOIUrl":"https://doi.org/10.1109/ICIW.2008.65","url":null,"abstract":"Control of pervasive computing environments is a well- known problem. Such management has to tackle issues of heterogeneity, dynamic binding, interoperability, security, and scalability, among others. The approach used in our AutoHAN home automation system is presented here. It employs a high-level rule-based control atop an ontological substrate, interacting with an application-level layer of rules. This design allows formalised representation of a domain, which lends itself to checkability, along with its reliable control. We discuss the implementation and characteristics of our approach.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2008 Third International Conference on Internet and Web Applications and Services
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1