Reputation services are acting as a secure informative service which is responsible for maintaining a dynamic and adaptive trust and reputation metric for its community increasingly. Resources, including services providers and consumers, continuously interact with the reputation services to create a community rating mechanism that co-operatively assists their future decisions based on the overall community experiences. In the reputation services system, resources and services are ranked based on the reputation they obtain. This paper studies some necessary aspects of reputation and reputation services, such as their definition, framework and applications, after offeing some cases, RS system and its network are designed.
{"title":"Research and Design on Reputation Services (RS) System","authors":"Shouqiang Liu, Deyu Qi, Jun Xiang, Baogang Chen","doi":"10.1109/ISECS.2008.225","DOIUrl":"https://doi.org/10.1109/ISECS.2008.225","url":null,"abstract":"Reputation services are acting as a secure informative service which is responsible for maintaining a dynamic and adaptive trust and reputation metric for its community increasingly. Resources, including services providers and consumers, continuously interact with the reputation services to create a community rating mechanism that co-operatively assists their future decisions based on the overall community experiences. In the reputation services system, resources and services are ranked based on the reputation they obtain. This paper studies some necessary aspects of reputation and reputation services, such as their definition, framework and applications, after offeing some cases, RS system and its network are designed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122531775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recognition of the wheel rim is a crucial area for vehicle safety. We present a novel recognition method for the detection of wheel rim whose projective curve is an ellipse. An image preprocessing method including the Otsu algorithm to binary the gray image, removing spurious areas and region filling algorithm is introduced to segment the rim area correctly. Then the ellipse rim region is considered as a 2D sheet and the centroid coordinate of the ellipse region is identified by the formula of calculating mass center. At last, all the five parameters to construct the ellipse of wheel rim are obtained according to the geometrical property that the optimum vertex on the semiaxis is the point on the edge of ellipse whose distance between the centroid and the point is maximum or minimum. The experimental results show that the proposed method recognizes the wheel rim efficiently and precisely.
{"title":"A Novel Method for Wheel Rim Recognition","authors":"Guan Xu, Jian Su, H. Pan, Donglin Zhang","doi":"10.1109/ISECS.2008.160","DOIUrl":"https://doi.org/10.1109/ISECS.2008.160","url":null,"abstract":"The recognition of the wheel rim is a crucial area for vehicle safety. We present a novel recognition method for the detection of wheel rim whose projective curve is an ellipse. An image preprocessing method including the Otsu algorithm to binary the gray image, removing spurious areas and region filling algorithm is introduced to segment the rim area correctly. Then the ellipse rim region is considered as a 2D sheet and the centroid coordinate of the ellipse region is identified by the formula of calculating mass center. At last, all the five parameters to construct the ellipse of wheel rim are obtained according to the geometrical property that the optimum vertex on the semiaxis is the point on the edge of ellipse whose distance between the centroid and the point is maximum or minimum. The experimental results show that the proposed method recognizes the wheel rim efficiently and precisely.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article is related to security of information and data. Some computer and network users use ICT to abuse this technology and to get some sensitiveinformation of someone else. This is a big problem oftoday's information society and communication networks. This paper describes possibilities of sensitive data securing.
{"title":"Research on the Security of Information and Data in the Communication","authors":"Xiao Han","doi":"10.1109/ISECS.2008.185","DOIUrl":"https://doi.org/10.1109/ISECS.2008.185","url":null,"abstract":"This article is related to security of information and data. Some computer and network users use ICT to abuse this technology and to get some sensitiveinformation of someone else. This is a big problem oftoday's information society and communication networks. This paper describes possibilities of sensitive data securing.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To solve the interoperable problem during current certificate validation process of different certificate authorities (CAs), the new system DNS-OCSP is proposed by incorporating DNS-style referral, which can construct a unified certificate validation mechanism between different CAs. The architecture of DNS-OCSP is presented, and the workflow of DNS-OCSP is illuminated. It has been shown that the DNS-OCSP is more accessible and scalable.
{"title":"Unified Certificate Validation System DNS-OCSP","authors":"Shigen Shen, Guangxue Yue","doi":"10.1109/ISECS.2008.53","DOIUrl":"https://doi.org/10.1109/ISECS.2008.53","url":null,"abstract":"To solve the interoperable problem during current certificate validation process of different certificate authorities (CAs), the new system DNS-OCSP is proposed by incorporating DNS-style referral, which can construct a unified certificate validation mechanism between different CAs. The architecture of DNS-OCSP is presented, and the workflow of DNS-OCSP is illuminated. It has been shown that the DNS-OCSP is more accessible and scalable.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133091035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-commerce is closely related to international logistics. International logistics in China developed rapidly, but many problems appeared. In the e-commerce environment, learn from the developed countries, advanced logistics experience, methods and policies may be used to promote the international logistics. International strategy may be implemented, including the implementation of core strategies and conditions strategies of international logistics enterprises. At the same time, a dynamic e-commerce based on the Web service and the strategy of the international logistics train qualified personnel is necessary.
{"title":"The Study on Electronic Commerce and Development of International Logistics","authors":"Zhongquan Zou","doi":"10.1109/ISECS.2008.165","DOIUrl":"https://doi.org/10.1109/ISECS.2008.165","url":null,"abstract":"E-commerce is closely related to international logistics. International logistics in China developed rapidly, but many problems appeared. In the e-commerce environment, learn from the developed countries, advanced logistics experience, methods and policies may be used to promote the international logistics. International strategy may be implemented, including the implementation of core strategies and conditions strategies of international logistics enterprises. At the same time, a dynamic e-commerce based on the Web service and the strategy of the international logistics train qualified personnel is necessary.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the transformation of service mode in enterprise from production-centered to customer-centered, improving the knowledge service level of customer service center to better meet customer's knowledge requirement becomes the key for the success of enterprise. In this paper, the construction of the knowledge push system served for customer service center was described. By the knowledge push system, various kinds of Enterprise application could be integrated and the knowledge service capability of customer service center could be promoted. Firstly, the concept of knowledge push was introduced and the customer-centered knowledge push requirement was analyzed. Then, the construction method of customer-centered integrative knowledge push system was proposed, which included the frame, the running flow and the key implementation technologies of knowledge push system. Finally, an instance analysis was given to illuminate that the customer-centered integrative knowledge push system could effectively improve the work efficiency of customer service center and customer satisfaction.
{"title":"Research on the Construction of Customer-centered Integrative Knowledge Push System","authors":"Yong Feng, Hongyan Xu, Song-yu Yan","doi":"10.1109/ISECS.2008.45","DOIUrl":"https://doi.org/10.1109/ISECS.2008.45","url":null,"abstract":"With the transformation of service mode in enterprise from production-centered to customer-centered, improving the knowledge service level of customer service center to better meet customer's knowledge requirement becomes the key for the success of enterprise. In this paper, the construction of the knowledge push system served for customer service center was described. By the knowledge push system, various kinds of Enterprise application could be integrated and the knowledge service capability of customer service center could be promoted. Firstly, the concept of knowledge push was introduced and the customer-centered knowledge push requirement was analyzed. Then, the construction method of customer-centered integrative knowledge push system was proposed, which included the frame, the running flow and the key implementation technologies of knowledge push system. Finally, an instance analysis was given to illuminate that the customer-centered integrative knowledge push system could effectively improve the work efficiency of customer service center and customer satisfaction.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134609001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Group signature can provide anonymity for signers, and in CIS'2007, Wang et.al. presented an efficient group signature schemes secure in the standard model by combining the HSDH variant signature scheme of Okamoto scheme and NIZK proof techniques used by Boyen and Waters. In this paper, we point out that the scheme in CIS'07 is not unforgeable because of the wrong construction of the HSDH variant signature scheme. We correct the mistake and give the corresponding group signature scheme without random oracle using the same method in CIS'07, and the efficiency is decreased a little. In addition, we improve the new scheme to present a new group signature scheme in the standard model, and the new scheme has a relatively shorter public key, secret key length, and needs less computation.
{"title":"Modification and Improvement on Group Signature Scheme without Random Oracles","authors":"Wang Shaohui","doi":"10.1109/ISECS.2008.154","DOIUrl":"https://doi.org/10.1109/ISECS.2008.154","url":null,"abstract":"Group signature can provide anonymity for signers, and in CIS'2007, Wang et.al. presented an efficient group signature schemes secure in the standard model by combining the HSDH variant signature scheme of Okamoto scheme and NIZK proof techniques used by Boyen and Waters. In this paper, we point out that the scheme in CIS'07 is not unforgeable because of the wrong construction of the HSDH variant signature scheme. We correct the mistake and give the corresponding group signature scheme without random oracle using the same method in CIS'07, and the efficiency is decreased a little. In addition, we improve the new scheme to present a new group signature scheme in the standard model, and the new scheme has a relatively shorter public key, secret key length, and needs less computation.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a business process is essential in running an enterprise, this paper aims toward improving software architecture by extracting business-relevant semantics from business logic and transforming them as important elements that need to be molded and represented in software architecture. This allows for the development of a business process-oriented software architecture (BPOSA) that can support smoother business process change. The paper introduces the structure of BPOSA and its work mode. Then it describes the steps involved in designing a process-oriented software system, and provides analysis and design methods of extending process-relevant attributes for application in business operations.
{"title":"Business Process-Oriented Software Architecture for Supporting Business Process Change","authors":"Qing Yao, Jing Zhang, Haiyang Wang","doi":"10.1109/ISECS.2008.46","DOIUrl":"https://doi.org/10.1109/ISECS.2008.46","url":null,"abstract":"As a business process is essential in running an enterprise, this paper aims toward improving software architecture by extracting business-relevant semantics from business logic and transforming them as important elements that need to be molded and represented in software architecture. This allows for the development of a business process-oriented software architecture (BPOSA) that can support smoother business process change. The paper introduces the structure of BPOSA and its work mode. Then it describes the steps involved in designing a process-oriented software system, and provides analysis and design methods of extending process-relevant attributes for application in business operations.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.
{"title":"Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement","authors":"Jizi Li, Baishu Li, Zhiping Li","doi":"10.1109/ISECS.2008.162","DOIUrl":"https://doi.org/10.1109/ISECS.2008.162","url":null,"abstract":"Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Some work is done to improve embedding capacity and locate tampered regions base on the prior research of fragile document watermark in this paper. And an effective fragile document watermarking algorithm is proposed. The wet paper code which adjusts the number of embedding watermark bits dynamically and takes full advantage of turnover pixels is used for embed watermark to improve embedding capacity. To locate tampered regions, the image is cut into blocks according to the content of it and every image block includes only one character or Chinese word. The Gray-code which was used for coding the watermark reduced the decoding errors caused by noise and improved the robustness of the watermark. The experiment shows that this algorithm can detect the location of tampered image and get better embedding capacity that is near the number of changeable pixels, which are demands of actual application.
{"title":"An Effective Fragile Document Watermarking Technique","authors":"Jiaxin Yu, Xinsheng Wang, Jianfei Li, Xu Nan","doi":"10.1109/ISECS.2008.91","DOIUrl":"https://doi.org/10.1109/ISECS.2008.91","url":null,"abstract":"Some work is done to improve embedding capacity and locate tampered regions base on the prior research of fragile document watermark in this paper. And an effective fragile document watermarking algorithm is proposed. The wet paper code which adjusts the number of embedding watermark bits dynamically and takes full advantage of turnover pixels is used for embed watermark to improve embedding capacity. To locate tampered regions, the image is cut into blocks according to the content of it and every image block includes only one character or Chinese word. The Gray-code which was used for coding the watermark reduced the decoding errors caused by noise and improved the robustness of the watermark. The experiment shows that this algorithm can detect the location of tampered image and get better embedding capacity that is near the number of changeable pixels, which are demands of actual application.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122448501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}