Reputation services are acting as a secure informative service which is responsible for maintaining a dynamic and adaptive trust and reputation metric for its community increasingly. Resources, including services providers and consumers, continuously interact with the reputation services to create a community rating mechanism that co-operatively assists their future decisions based on the overall community experiences. In the reputation services system, resources and services are ranked based on the reputation they obtain. This paper studies some necessary aspects of reputation and reputation services, such as their definition, framework and applications, after offeing some cases, RS system and its network are designed.
{"title":"Research and Design on Reputation Services (RS) System","authors":"Shouqiang Liu, Deyu Qi, Jun Xiang, Baogang Chen","doi":"10.1109/ISECS.2008.225","DOIUrl":"https://doi.org/10.1109/ISECS.2008.225","url":null,"abstract":"Reputation services are acting as a secure informative service which is responsible for maintaining a dynamic and adaptive trust and reputation metric for its community increasingly. Resources, including services providers and consumers, continuously interact with the reputation services to create a community rating mechanism that co-operatively assists their future decisions based on the overall community experiences. In the reputation services system, resources and services are ranked based on the reputation they obtain. This paper studies some necessary aspects of reputation and reputation services, such as their definition, framework and applications, after offeing some cases, RS system and its network are designed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122531775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recognition of the wheel rim is a crucial area for vehicle safety. We present a novel recognition method for the detection of wheel rim whose projective curve is an ellipse. An image preprocessing method including the Otsu algorithm to binary the gray image, removing spurious areas and region filling algorithm is introduced to segment the rim area correctly. Then the ellipse rim region is considered as a 2D sheet and the centroid coordinate of the ellipse region is identified by the formula of calculating mass center. At last, all the five parameters to construct the ellipse of wheel rim are obtained according to the geometrical property that the optimum vertex on the semiaxis is the point on the edge of ellipse whose distance between the centroid and the point is maximum or minimum. The experimental results show that the proposed method recognizes the wheel rim efficiently and precisely.
{"title":"A Novel Method for Wheel Rim Recognition","authors":"Guan Xu, Jian Su, H. Pan, Donglin Zhang","doi":"10.1109/ISECS.2008.160","DOIUrl":"https://doi.org/10.1109/ISECS.2008.160","url":null,"abstract":"The recognition of the wheel rim is a crucial area for vehicle safety. We present a novel recognition method for the detection of wheel rim whose projective curve is an ellipse. An image preprocessing method including the Otsu algorithm to binary the gray image, removing spurious areas and region filling algorithm is introduced to segment the rim area correctly. Then the ellipse rim region is considered as a 2D sheet and the centroid coordinate of the ellipse region is identified by the formula of calculating mass center. At last, all the five parameters to construct the ellipse of wheel rim are obtained according to the geometrical property that the optimum vertex on the semiaxis is the point on the edge of ellipse whose distance between the centroid and the point is maximum or minimum. The experimental results show that the proposed method recognizes the wheel rim efficiently and precisely.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article is related to security of information and data. Some computer and network users use ICT to abuse this technology and to get some sensitiveinformation of someone else. This is a big problem oftoday's information society and communication networks. This paper describes possibilities of sensitive data securing.
{"title":"Research on the Security of Information and Data in the Communication","authors":"Xiao Han","doi":"10.1109/ISECS.2008.185","DOIUrl":"https://doi.org/10.1109/ISECS.2008.185","url":null,"abstract":"This article is related to security of information and data. Some computer and network users use ICT to abuse this technology and to get some sensitiveinformation of someone else. This is a big problem oftoday's information society and communication networks. This paper describes possibilities of sensitive data securing.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To solve the interoperable problem during current certificate validation process of different certificate authorities (CAs), the new system DNS-OCSP is proposed by incorporating DNS-style referral, which can construct a unified certificate validation mechanism between different CAs. The architecture of DNS-OCSP is presented, and the workflow of DNS-OCSP is illuminated. It has been shown that the DNS-OCSP is more accessible and scalable.
{"title":"Unified Certificate Validation System DNS-OCSP","authors":"Shigen Shen, Guangxue Yue","doi":"10.1109/ISECS.2008.53","DOIUrl":"https://doi.org/10.1109/ISECS.2008.53","url":null,"abstract":"To solve the interoperable problem during current certificate validation process of different certificate authorities (CAs), the new system DNS-OCSP is proposed by incorporating DNS-style referral, which can construct a unified certificate validation mechanism between different CAs. The architecture of DNS-OCSP is presented, and the workflow of DNS-OCSP is illuminated. It has been shown that the DNS-OCSP is more accessible and scalable.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133091035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-commerce is closely related to international logistics. International logistics in China developed rapidly, but many problems appeared. In the e-commerce environment, learn from the developed countries, advanced logistics experience, methods and policies may be used to promote the international logistics. International strategy may be implemented, including the implementation of core strategies and conditions strategies of international logistics enterprises. At the same time, a dynamic e-commerce based on the Web service and the strategy of the international logistics train qualified personnel is necessary.
{"title":"The Study on Electronic Commerce and Development of International Logistics","authors":"Zhongquan Zou","doi":"10.1109/ISECS.2008.165","DOIUrl":"https://doi.org/10.1109/ISECS.2008.165","url":null,"abstract":"E-commerce is closely related to international logistics. International logistics in China developed rapidly, but many problems appeared. In the e-commerce environment, learn from the developed countries, advanced logistics experience, methods and policies may be used to promote the international logistics. International strategy may be implemented, including the implementation of core strategies and conditions strategies of international logistics enterprises. At the same time, a dynamic e-commerce based on the Web service and the strategy of the international logistics train qualified personnel is necessary.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the transformation of service mode in enterprise from production-centered to customer-centered, improving the knowledge service level of customer service center to better meet customer's knowledge requirement becomes the key for the success of enterprise. In this paper, the construction of the knowledge push system served for customer service center was described. By the knowledge push system, various kinds of Enterprise application could be integrated and the knowledge service capability of customer service center could be promoted. Firstly, the concept of knowledge push was introduced and the customer-centered knowledge push requirement was analyzed. Then, the construction method of customer-centered integrative knowledge push system was proposed, which included the frame, the running flow and the key implementation technologies of knowledge push system. Finally, an instance analysis was given to illuminate that the customer-centered integrative knowledge push system could effectively improve the work efficiency of customer service center and customer satisfaction.
{"title":"Research on the Construction of Customer-centered Integrative Knowledge Push System","authors":"Yong Feng, Hongyan Xu, Song-yu Yan","doi":"10.1109/ISECS.2008.45","DOIUrl":"https://doi.org/10.1109/ISECS.2008.45","url":null,"abstract":"With the transformation of service mode in enterprise from production-centered to customer-centered, improving the knowledge service level of customer service center to better meet customer's knowledge requirement becomes the key for the success of enterprise. In this paper, the construction of the knowledge push system served for customer service center was described. By the knowledge push system, various kinds of Enterprise application could be integrated and the knowledge service capability of customer service center could be promoted. Firstly, the concept of knowledge push was introduced and the customer-centered knowledge push requirement was analyzed. Then, the construction method of customer-centered integrative knowledge push system was proposed, which included the frame, the running flow and the key implementation technologies of knowledge push system. Finally, an instance analysis was given to illuminate that the customer-centered integrative knowledge push system could effectively improve the work efficiency of customer service center and customer satisfaction.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shipbuilding is a typical complex system engineering and requires many different enterprises and plants to work cooperatively to strive for the maximum profit. Supported by the computer, information, and Internet technology etc., CSCW plays a very crucial role in the multi-team, multi-subject, multi-layer field. Therefore, CSCW is necessary to be applied into the shipbuilding industry according to the shipbuilding characters and market requirements. Firstly, a collaborative shipbuilding system is set up and analyzed in detail, and then a collaborative decision support system is built up in order to make operations fluent. In the end, a collaborative ship commerce system is constructed and discussed. The application of CSCW is evidently useful to improve the shipbuilding industry and enhance the enterprisepsilas competitive capability.
{"title":"Research on the Application of CSCW in Shipbuilding Industry","authors":"Qingying Zhang, Weihong Yue, Chengfang Wang","doi":"10.1109/ISECS.2008.40","DOIUrl":"https://doi.org/10.1109/ISECS.2008.40","url":null,"abstract":"Shipbuilding is a typical complex system engineering and requires many different enterprises and plants to work cooperatively to strive for the maximum profit. Supported by the computer, information, and Internet technology etc., CSCW plays a very crucial role in the multi-team, multi-subject, multi-layer field. Therefore, CSCW is necessary to be applied into the shipbuilding industry according to the shipbuilding characters and market requirements. Firstly, a collaborative shipbuilding system is set up and analyzed in detail, and then a collaborative decision support system is built up in order to make operations fluent. In the end, a collaborative ship commerce system is constructed and discussed. The application of CSCW is evidently useful to improve the shipbuilding industry and enhance the enterprisepsilas competitive capability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114173712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Group signature can provide anonymity for signers, and in CIS'2007, Wang et.al. presented an efficient group signature schemes secure in the standard model by combining the HSDH variant signature scheme of Okamoto scheme and NIZK proof techniques used by Boyen and Waters. In this paper, we point out that the scheme in CIS'07 is not unforgeable because of the wrong construction of the HSDH variant signature scheme. We correct the mistake and give the corresponding group signature scheme without random oracle using the same method in CIS'07, and the efficiency is decreased a little. In addition, we improve the new scheme to present a new group signature scheme in the standard model, and the new scheme has a relatively shorter public key, secret key length, and needs less computation.
{"title":"Modification and Improvement on Group Signature Scheme without Random Oracles","authors":"Wang Shaohui","doi":"10.1109/ISECS.2008.154","DOIUrl":"https://doi.org/10.1109/ISECS.2008.154","url":null,"abstract":"Group signature can provide anonymity for signers, and in CIS'2007, Wang et.al. presented an efficient group signature schemes secure in the standard model by combining the HSDH variant signature scheme of Okamoto scheme and NIZK proof techniques used by Boyen and Waters. In this paper, we point out that the scheme in CIS'07 is not unforgeable because of the wrong construction of the HSDH variant signature scheme. We correct the mistake and give the corresponding group signature scheme without random oracle using the same method in CIS'07, and the efficiency is decreased a little. In addition, we improve the new scheme to present a new group signature scheme in the standard model, and the new scheme has a relatively shorter public key, secret key length, and needs less computation.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Biometric-based authentication can provide strong safety guarantee of user identity, but creates other concerns pertaining to template security. How to prevent the templates from being abused, and how to protect the users' privacy well are important problems. This paper proposes an approach based on knowledge signatures to solve these problems, which provides a cancelable template. Only a non-invertible transformed version of the biometrics is stored in the server, and the original data can't be obtained, so the users' privacy can be protected well. Moreover, distinguished with other cancelable templates, it only needs an incompact association between the key and the biometrics feature, even if the key is disclosed, the original biometrics feature wouldn't be revealed. The experimental results show that the proposed approach is practical.
{"title":"Cancelable Voiceprint Templates Based on Knowledge Signatures","authors":"Wenhua Xu, Qianhua He, Yanxiong Li, Tao Li","doi":"10.1109/ISECS.2008.100","DOIUrl":"https://doi.org/10.1109/ISECS.2008.100","url":null,"abstract":"Biometric-based authentication can provide strong safety guarantee of user identity, but creates other concerns pertaining to template security. How to prevent the templates from being abused, and how to protect the users' privacy well are important problems. This paper proposes an approach based on knowledge signatures to solve these problems, which provides a cancelable template. Only a non-invertible transformed version of the biometrics is stored in the server, and the original data can't be obtained, so the users' privacy can be protected well. Moreover, distinguished with other cancelable templates, it only needs an incompact association between the key and the biometrics feature, even if the key is disclosed, the original biometrics feature wouldn't be revealed. The experimental results show that the proposed approach is practical.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114603586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trust and security are two important concepts in information security, but the difference between them is fuzzy. This paper proposes a new formal definition of trust for task-oriented information system. The new definition includes detailed information about trust itself. It defines trust of a component as the relationship of the expected behaviors and the trusted prerequisites, and puts forward a formal directed-graph model to express it. With the directed-graph model, it expands trust chain to trust tree and trust forest, use them to give a formal description of trust and security of information system, it also discusses trusted module, and brings forward a multi-layer trusted structure to design trusted module.
{"title":"A Formal Model of Trust and Security for Task-Oriented Information System","authors":"Li Wei-peng, Hu Ju","doi":"10.1109/ISECS.2008.191","DOIUrl":"https://doi.org/10.1109/ISECS.2008.191","url":null,"abstract":"Trust and security are two important concepts in information security, but the difference between them is fuzzy. This paper proposes a new formal definition of trust for task-oriented information system. The new definition includes detailed information about trust itself. It defines trust of a component as the relationship of the expected behaviors and the trusted prerequisites, and puts forward a formal directed-graph model to express it. With the directed-graph model, it expands trust chain to trust tree and trust forest, use them to give a formal description of trust and security of information system, it also discusses trusted module, and brings forward a multi-layer trusted structure to design trusted module.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116587648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}