One fundamental issue in application of wireless sensor networks is to provide proper coverage of their deployment regions, which answers the questions about the quality of service (surveillance or monitoring) that can be provided by a sensor network. In this paper, we consider the point-coverage problem where a given set of n points requires to be covered in the two-dimension (such as monitoring leakage of hazardous gaseous materials at ventilation points or observing the fixed location important targets). Our objective is to place the minimal number sensors such that coverage points in the field can be covered by at least k sensors. By combining computational geometry and combinatorics techniques, we investigate the issue from a different angle, demonstrate an important relationship between coverage points and sensors, and develop an efficient algorithm for 1-coverage problem. Finally, we indicate our approach can easily solve k-coverage problem based on 1-coverage.
{"title":"An Efficient Approach for Point Coverage Problem of Sensor Network","authors":"GaoJun Fan, Feng Liang, Shiyao Jin","doi":"10.1109/ISECS.2008.89","DOIUrl":"https://doi.org/10.1109/ISECS.2008.89","url":null,"abstract":"One fundamental issue in application of wireless sensor networks is to provide proper coverage of their deployment regions, which answers the questions about the quality of service (surveillance or monitoring) that can be provided by a sensor network. In this paper, we consider the point-coverage problem where a given set of n points requires to be covered in the two-dimension (such as monitoring leakage of hazardous gaseous materials at ventilation points or observing the fixed location important targets). Our objective is to place the minimal number sensors such that coverage points in the field can be covered by at least k sensors. By combining computational geometry and combinatorics techniques, we investigate the issue from a different angle, demonstrate an important relationship between coverage points and sensors, and develop an efficient algorithm for 1-coverage problem. Finally, we indicate our approach can easily solve k-coverage problem based on 1-coverage.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"485 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on evolutionary game theory. In this paper, we set up the information security game model with penalty parameter, calculate replicator dynamics, and analyze the evolutionary stable strategy of the game model. The result reveals that reducing the investment cost is the key factor to promote information security investment. If this condition can not be satisfied, the regulation of penalty parameter will help to promote the investment. The research method in this paper provides a new thought for the solution of information security in the mobile electronic commerce chain.
{"title":"Information Security Problem Research Based on Game Theory","authors":"Wei Sun, Xiangwei Kong, Dequan He, Xingang You","doi":"10.1109/ISECS.2008.147","DOIUrl":"https://doi.org/10.1109/ISECS.2008.147","url":null,"abstract":"The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on evolutionary game theory. In this paper, we set up the information security game model with penalty parameter, calculate replicator dynamics, and analyze the evolutionary stable strategy of the game model. The result reveals that reducing the investment cost is the key factor to promote information security investment. If this condition can not be satisfied, the regulation of penalty parameter will help to promote the investment. The research method in this paper provides a new thought for the solution of information security in the mobile electronic commerce chain.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.
{"title":"Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation","authors":"Zheng Wu, Debao Xiao, Min Xiao, Xi Peng","doi":"10.1109/ISECS.2008.85","DOIUrl":"https://doi.org/10.1109/ISECS.2008.85","url":null,"abstract":"Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.
{"title":"A Distributed Electronic Authentication Scheme in E-Business System","authors":"Xinxia Song, Zhigang Chen","doi":"10.1109/ISECS.2008.125","DOIUrl":"https://doi.org/10.1109/ISECS.2008.125","url":null,"abstract":"A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.
{"title":"Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System","authors":"Huijuan Lu, Jianguo Chen, Wei Wei","doi":"10.1109/ISECS.2008.178","DOIUrl":"https://doi.org/10.1109/ISECS.2008.178","url":null,"abstract":"An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.
{"title":"Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement","authors":"Jizi Li, Baishu Li, Zhiping Li","doi":"10.1109/ISECS.2008.162","DOIUrl":"https://doi.org/10.1109/ISECS.2008.162","url":null,"abstract":"Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this paper is to analyze a series of factors that affects innovation and demonstrate that innovation are positively related to performance during business process integration and re-engineering based on e-commerce. According to prior research, the paper develops a number of testable hypotheses. It examines how trust, coordination, process innovation influence improvements in performance. The paper uses structural equations modeling and empirically tests these hypotheses using a sample of 218 Chinese organizations. The findings consider that coordination plays a mediating role between trust and process innovation and process innovation plays a mediating role between coordination and organizational performance. Finally, implications for researchers and practitioners are presented.
{"title":"Antecedents and Consequences of Process Innovation on E-Commerce","authors":"Wang Cheng, Lan Hailin, Xie Hongming","doi":"10.1109/ISECS.2008.137","DOIUrl":"https://doi.org/10.1109/ISECS.2008.137","url":null,"abstract":"The purpose of this paper is to analyze a series of factors that affects innovation and demonstrate that innovation are positively related to performance during business process integration and re-engineering based on e-commerce. According to prior research, the paper develops a number of testable hypotheses. It examines how trust, coordination, process innovation influence improvements in performance. The paper uses structural equations modeling and empirically tests these hypotheses using a sample of 218 Chinese organizations. The findings consider that coordination plays a mediating role between trust and process innovation and process innovation plays a mediating role between coordination and organizational performance. Finally, implications for researchers and practitioners are presented.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116956116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.
{"title":"The Algorithm of Obtaining Best Rules Based on Rough Set","authors":"Shulin Chen, Lei Wang","doi":"10.1109/ISECS.2008.14","DOIUrl":"https://doi.org/10.1109/ISECS.2008.14","url":null,"abstract":"With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.
{"title":"Key Technologies for Security Enhancing of Payment Gateway","authors":"Xuewang Zhang, Linlin Wang","doi":"10.1109/ISECS.2008.37","DOIUrl":"https://doi.org/10.1109/ISECS.2008.37","url":null,"abstract":"The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.
{"title":"Electronic Time Stamping Safety and Efficiency Optimize Technique Research","authors":"Hong-Jiao Ma, Yu Hua, Wei Guo","doi":"10.1109/ISECS.2008.11","DOIUrl":"https://doi.org/10.1109/ISECS.2008.11","url":null,"abstract":"Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"411 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}