首页 > 最新文献

2008 International Symposium on Electronic Commerce and Security最新文献

英文 中文
A Research of Trust Based on E-Commerce 基于电子商务的信任研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.166
Lihua Ruan, Ding-shi Tian
The openness and anonymity of the Internet have given rise to online fraud, which has severely affected the development of China's e-commerce. This paper analyzes the impact of relevant factors on trust in e-commerce of China and proposes that China should draw on the experiences of developed countries to establish and improve relevant legal system, combing personal credit system with the ID card system, developing and improving social credit system, punishing the dishonesty. Meanwhile, the online third-party certificate authority specializing in facilitating the development of e-commerce need to be fostered.
互联网的开放性和匿名性导致了网络欺诈的滋生,严重影响了中国电子商务的发展。本文分析了相关因素对中国电子商务信任的影响,提出中国应借鉴发达国家的经验,建立健全相关法律制度,将个人信用制度与身份证制度相结合,发展完善社会信用体系,惩治失信行为。同时,需要培育专门促进电子商务发展的网上第三方证书颁发机构。
{"title":"A Research of Trust Based on E-Commerce","authors":"Lihua Ruan, Ding-shi Tian","doi":"10.1109/ISECS.2008.166","DOIUrl":"https://doi.org/10.1109/ISECS.2008.166","url":null,"abstract":"The openness and anonymity of the Internet have given rise to online fraud, which has severely affected the development of China's e-commerce. This paper analyzes the impact of relevant factors on trust in e-commerce of China and proposes that China should draw on the experiences of developed countries to establish and improve relevant legal system, combing personal credit system with the ID card system, developing and improving social credit system, punishing the dishonesty. Meanwhile, the online third-party certificate authority specializing in facilitating the development of e-commerce need to be fostered.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Statistics-Based Watermarking Scheme Robust to Print-and-Scan 一种基于统计的抗打印扫描水印方案
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.68
Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang
This paper proposes a print-and-scan (PS) resilient watermarking scheme based on the mean of DCT coefficients (MDC) for a fixed AC frequency of image. We investigate the property of MDC in the PS process and find that the MDC is nearly unchanged after PS, which is approximately zero for natural (non-watermarked) images. The watermark bits are embedded by shifting these PS-invariants to be positive or negative. The embedding intensity of the scheme is determined by a JND model to avoid the visible distortion. Experimental results show that the scheme can successfully resist the PS attack in different printing status.
针对固定交流频率的图像,提出了一种基于DCT系数均值(MDC)的打印扫描(PS)弹性水印方案。我们研究了PS过程中MDC的性质,发现PS后MDC几乎没有变化,对于自然(非水印)图像近似为零。水印位是通过将这些ps不变量移位为正或负来嵌入的。该方案的嵌入强度由JND模型确定,避免了可见的失真。实验结果表明,该方案能够在不同的打印状态下成功抵御PS攻击。
{"title":"A Statistics-Based Watermarking Scheme Robust to Print-and-Scan","authors":"Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang","doi":"10.1109/ISECS.2008.68","DOIUrl":"https://doi.org/10.1109/ISECS.2008.68","url":null,"abstract":"This paper proposes a print-and-scan (PS) resilient watermarking scheme based on the mean of DCT coefficients (MDC) for a fixed AC frequency of image. We investigate the property of MDC in the PS process and find that the MDC is nearly unchanged after PS, which is approximately zero for natural (non-watermarked) images. The watermark bits are embedded by shifting these PS-invariants to be positive or negative. The embedding intensity of the scheme is determined by a JND model to avoid the visible distortion. Experimental results show that the scheme can successfully resist the PS attack in different printing status.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A New Web Text Clustering Algorithm Based on DFSSM 一种基于DFSSM的Web文本聚类算法
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.110
Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song
A new algorithm of Web text clustering mining is presented, which is based on the Discovery Feature Sub-space Model (DFSSM). This algorithm includes the training stage of SOM and the clustering stage, which characterizes self-stability and powerful antinoise ability. It can distinguishes the most meaningful features from the Concept Space without the evaluation function. we have applied the algorithm to the modern long-distance education. Through the analysis of the experimental results, it is obvious that this algorithm can effective help users to get valuable information from WWW quickly.
提出了一种基于发现特征子空间模型(DFSSM)的Web文本聚类挖掘算法。该算法包括SOM的训练阶段和聚类阶段,具有自稳定性和强大的抗噪能力。它可以在没有评价函数的情况下将最有意义的特征与概念空间区分开来。将该算法应用到现代远程教育中。通过对实验结果的分析,可以明显看出该算法可以有效地帮助用户快速从WWW中获取有价值的信息。
{"title":"A New Web Text Clustering Algorithm Based on DFSSM","authors":"Bingru Yang, Zefeng Song, Yinglong Wang, Wei Song","doi":"10.1109/ISECS.2008.110","DOIUrl":"https://doi.org/10.1109/ISECS.2008.110","url":null,"abstract":"A new algorithm of Web text clustering mining is presented, which is based on the Discovery Feature Sub-space Model (DFSSM). This algorithm includes the training stage of SOM and the clustering stage, which characterizes self-stability and powerful antinoise ability. It can distinguishes the most meaningful features from the Concept Space without the evaluation function. we have applied the algorithm to the modern long-distance education. Through the analysis of the experimental results, it is obvious that this algorithm can effective help users to get valuable information from WWW quickly.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel 创意产品用户购买意愿预测的实证研究——以服装为例
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.176
Chen Pang, Xiaofen Ji
A study of consumer acceptance of the Internet as a channel of purchasing creative products (e.g. apparel) was conducted using a modified technology acceptance model (TAM). Two consumer characteristics (product involvement and product innovativeness) were introduced into the TAM to develop an extended model. Through checking the extended model, we found that the proposed model was valid in explaining and predicting consumer behaviors in the creative product (clothing) e-commerce context. Perceived usefulness and ease of use of online apparel shopping had most significant effect on attitude towards online apparel purchasing, and were the primary determinants of consumerspsila behavioral intention. Conclusion and implications were discussed.
使用改进的技术接受模型(TAM)研究消费者对互联网作为购买创意产品(如服装)渠道的接受程度。将两个消费者特征(产品参与性和产品创新性)引入TAM,建立了一个扩展模型。通过对扩展模型的检验,我们发现所提出的模型在解释和预测创意产品(服装)电子商务情境下的消费者行为是有效的。感知有用性和易用性对在线服装购买态度的影响最为显著,是消费者行为意向的主要决定因素。讨论了结论和启示。
{"title":"An Empirical Study on Predicting User Purchase Intention on the Creative Product: A Case of Apparel","authors":"Chen Pang, Xiaofen Ji","doi":"10.1109/ISECS.2008.176","DOIUrl":"https://doi.org/10.1109/ISECS.2008.176","url":null,"abstract":"A study of consumer acceptance of the Internet as a channel of purchasing creative products (e.g. apparel) was conducted using a modified technology acceptance model (TAM). Two consumer characteristics (product involvement and product innovativeness) were introduced into the TAM to develop an extended model. Through checking the extended model, we found that the proposed model was valid in explaining and predicting consumer behaviors in the creative product (clothing) e-commerce context. Perceived usefulness and ease of use of online apparel shopping had most significant effect on attitude towards online apparel purchasing, and were the primary determinants of consumerspsila behavioral intention. Conclusion and implications were discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scalable Trust in Multi-agent E-commerce System 多代理电子商务系统中的可扩展信任
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.84
Shuliang Zhao, Haifeng Liu, Zhaohao Sun
Trust between agents is a key issue in multi-agent e-commerce system (MECS). With the expanding of system scale and the rapid increase of e-commerce, scalable trust in e-commerce system becomes critical. This article examines scalable trust of a system, in particular in e-commerce system, and classifies the trust between agents in e-commerce system. Then it discusses the realization of scalable trust from the viewpoint of sociology and engineering.
代理之间的信任是多代理电子商务系统中的一个关键问题。随着系统规模的扩大和电子商务的快速增长,电子商务系统的可扩展性信任变得至关重要。本文研究了一个系统,特别是电子商务系统中的可扩展信任,并对电子商务系统中代理之间的信任进行了分类。然后从社会学和工程学的角度讨论了可扩展信任的实现。
{"title":"Scalable Trust in Multi-agent E-commerce System","authors":"Shuliang Zhao, Haifeng Liu, Zhaohao Sun","doi":"10.1109/ISECS.2008.84","DOIUrl":"https://doi.org/10.1109/ISECS.2008.84","url":null,"abstract":"Trust between agents is a key issue in multi-agent e-commerce system (MECS). With the expanding of system scale and the rapid increase of e-commerce, scalable trust in e-commerce system becomes critical. This article examines scalable trust of a system, in particular in e-commerce system, and classifies the trust between agents in e-commerce system. Then it discusses the realization of scalable trust from the viewpoint of sociology and engineering.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity 基于外包市场成熟度的外包决策研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.15
Hongju Zhang, Jiajia Liu, Zhijun Yan
A correct outsourcing decision-making is the premise of a successful outsourcing. When making outsourcing decision, enterprise managers focus on inner factors, such as the firmpsilas core competency, financial status, technical status, organizational restructuring, and risk-sharing and so on. However, they neglect issues from the perspective of outsourcing market maturity. Thus it results in a limit decision. In this paper, an outsourcing market maturity model is proposed based on the analysis of outsourcing market. According to capability maturity model for software, an outsourcing decision framework is established, which provides a model on three key dimensions of core competency, asset specificity and market maturity.
正确的外包决策是外包成功的前提。企业管理者在进行外包决策时,关注的是企业内部因素,如企业核心竞争力、财务状况、技术状况、组织结构调整、风险分担等。然而,他们忽视了外包市场成熟度的问题。因此,它导致了一个极限决策。本文在分析外包市场的基础上,提出了一个外包市场成熟度模型。根据软件的能力成熟度模型,建立了软件外包决策框架,该框架提供了核心能力、资产专用性和市场成熟度三个关键维度的模型。
{"title":"A Research of Outsourcing Decision-making Based on Outsourcing Market Maturity","authors":"Hongju Zhang, Jiajia Liu, Zhijun Yan","doi":"10.1109/ISECS.2008.15","DOIUrl":"https://doi.org/10.1109/ISECS.2008.15","url":null,"abstract":"A correct outsourcing decision-making is the premise of a successful outsourcing. When making outsourcing decision, enterprise managers focus on inner factors, such as the firmpsilas core competency, financial status, technical status, organizational restructuring, and risk-sharing and so on. However, they neglect issues from the perspective of outsourcing market maturity. Thus it results in a limit decision. In this paper, an outsourcing market maturity model is proposed based on the analysis of outsourcing market. According to capability maturity model for software, an outsourcing decision framework is established, which provides a model on three key dimensions of core competency, asset specificity and market maturity.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Research of Modeling Methods for Workflow Process 工作流过程建模方法比较研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.55
Guoyin Jiang, Lihong Dong
The workflow model is key component of workflow system, it is significant for business process reengineering and optimization that the workflow management system is researched and developed. In this paper, the current state of research in workflow process modeling are overviewed after describing the essence and standard of workflow process modeling, the main common modeling theories include flow figure, status figure, activity network figure, IDEF, ECAA, Petri net, and so on. In order to solve the deficiency of formalized and graphic expression ability, complicated modeling procedure, the methods of solution for problems and development trend of workflow related theories are put forward, the main single advanced modeling methods are process data mining, extended Petri nets and process algebra, and suit modeling environment for these methods are analyzed and compared, and the combined modeling framework is introduced in the last part.
工作流模型是工作流系统的关键组成部分,研究和开发工作流管理系统对业务流程再造和优化具有重要意义。本文在阐述工作流过程建模的本质和标准的基础上,综述了工作流过程建模的研究现状,目前常用的建模理论有流图、状态图、活动网络图、IDEF、ECAA、Petri网等。针对工作流的形式化和图形化表达能力不足、建模过程复杂等问题,提出了工作流相关理论的解决方法和发展趋势,分析比较了目前主要的单一高级建模方法是过程数据挖掘、扩展Petri网和过程代数,并对这些方法的建模环境进行了分析比较,介绍了组合建模框架。
{"title":"Comparative Research of Modeling Methods for Workflow Process","authors":"Guoyin Jiang, Lihong Dong","doi":"10.1109/ISECS.2008.55","DOIUrl":"https://doi.org/10.1109/ISECS.2008.55","url":null,"abstract":"The workflow model is key component of workflow system, it is significant for business process reengineering and optimization that the workflow management system is researched and developed. In this paper, the current state of research in workflow process modeling are overviewed after describing the essence and standard of workflow process modeling, the main common modeling theories include flow figure, status figure, activity network figure, IDEF, ECAA, Petri net, and so on. In order to solve the deficiency of formalized and graphic expression ability, complicated modeling procedure, the methods of solution for problems and development trend of workflow related theories are put forward, the main single advanced modeling methods are process data mining, extended Petri nets and process algebra, and suit modeling environment for these methods are analyzed and compared, and the combined modeling framework is introduced in the last part.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Perceived Value on User Acceptance of Mobile Commerce 感知价值对用户接受移动商务的影响
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.9
Tao Zhou
User acceptance of mobile service is the first step for enterprises to successfully implement mobile commerce. Extant research has tried to explain user acceptance of mobile commerce based on TAM and neglected the impact of usage cost, enjoyment and social evaluation on user behavior. Based on the theory of perceived value,this paper examines the impact of perceived value on user acceptance behavior. Perceived value as a second-order factor includes four dimensions: financial value, quality value, emotional value and social value. We collected 184 valid papers and conducted data analysis with PLS Graph. The results show that perceived value strongly affects trust and satisfaction, further determining user acceptance intention. Among four dimensions, social value has relatively larger effect and financial value has weaker effect.
用户对移动业务的接受是企业成功实施移动商务的第一步。现有的研究试图基于TAM来解释用户对移动商务的接受,而忽略了使用成本、享受和社会评价对用户行为的影响。本文基于感知价值理论,考察了感知价值对用户接受行为的影响。感知价值作为二阶因素包括四个维度:财务价值、质量价值、情感价值和社会价值。我们收集了184篇有效论文,用PLS图进行数据分析。结果表明,感知价值对信任和满意度有强烈影响,进而决定用户接受意愿。在四个维度中,社会价值的影响相对较大,财务价值的影响较弱。
{"title":"The Impact of Perceived Value on User Acceptance of Mobile Commerce","authors":"Tao Zhou","doi":"10.1109/ISECS.2008.9","DOIUrl":"https://doi.org/10.1109/ISECS.2008.9","url":null,"abstract":"User acceptance of mobile service is the first step for enterprises to successfully implement mobile commerce. Extant research has tried to explain user acceptance of mobile commerce based on TAM and neglected the impact of usage cost, enjoyment and social evaluation on user behavior. Based on the theory of perceived value,this paper examines the impact of perceived value on user acceptance behavior. Perceived value as a second-order factor includes four dimensions: financial value, quality value, emotional value and social value. We collected 184 valid papers and conducted data analysis with PLS Graph. The results show that perceived value strongly affects trust and satisfaction, further determining user acceptance intention. Among four dimensions, social value has relatively larger effect and financial value has weaker effect.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116398378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Reliable Web Service Implementation Approach for Large Commercial Applications 大型商业应用程序的可靠Web服务实现方法
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.21
Jianbin Huang, Heli Sun
Reliability of Web services is an important problem for developing electronic business applications. However, when the number of service requests become very huge it is hard to guarantee the availability of a service. In this paper, a novel approach for reliable Web service provisioning based on mobile agent and resource discovery technologies is proposed. In our approach, new service can be appropriately instantiated on demand, therefore reducing the risk of service being unavailable. Then a dispatching algorithm for resources selection and a multi-phase resource planning algorithm for composite Web services are presented. Experimental results show that our approach is more robust and adaptive in highly dynamic environments.
Web服务的可靠性是开发电子业务应用程序的一个重要问题。然而,当服务请求的数量变得非常大时,很难保证服务的可用性。本文提出了一种基于移动代理和资源发现技术的Web服务可靠提供方法。在我们的方法中,可以根据需要适当地实例化新服务,从而降低服务不可用的风险。然后提出了一种资源选择调度算法和复合Web服务的多阶段资源规划算法。实验结果表明,该方法在高动态环境下具有较强的鲁棒性和适应性。
{"title":"A Reliable Web Service Implementation Approach for Large Commercial Applications","authors":"Jianbin Huang, Heli Sun","doi":"10.1109/ISECS.2008.21","DOIUrl":"https://doi.org/10.1109/ISECS.2008.21","url":null,"abstract":"Reliability of Web services is an important problem for developing electronic business applications. However, when the number of service requests become very huge it is hard to guarantee the availability of a service. In this paper, a novel approach for reliable Web service provisioning based on mobile agent and resource discovery technologies is proposed. In our approach, new service can be appropriately instantiated on demand, therefore reducing the risk of service being unavailable. Then a dispatching algorithm for resources selection and a multi-phase resource planning algorithm for composite Web services are presented. Experimental results show that our approach is more robust and adaptive in highly dynamic environments.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"13 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123648363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Criterion-Based Access Control for Multilevel Database Security 基于标准的多级数据库安全访问控制
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.198
Leon Pan
This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.
本文提出了一种新的基于标准的访问控制方法来解决多级数据库安全问题。在这种方法中,授权规则被转换为安全标准、安全标准表达式和安全标准子集。安全标准表达式与(子)对象相关联,作为锁,安全标准与用户相关联,作为密钥。细粒度多级访问控制是通过使用可用的安全标准(密钥)来评估安全标准表达式(锁)来实现的。用户是否可以访问单元格、行、列或表等(子)对象取决于相关安全标准表达式的求值。
{"title":"Using Criterion-Based Access Control for Multilevel Database Security","authors":"Leon Pan","doi":"10.1109/ISECS.2008.198","DOIUrl":"https://doi.org/10.1109/ISECS.2008.198","url":null,"abstract":"This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129870972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2008 International Symposium on Electronic Commerce and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1