首页 > 最新文献

2008 International Symposium on Electronic Commerce and Security最新文献

英文 中文
An Efficient Approach for Point Coverage Problem of Sensor Network 传感器网络点覆盖问题的一种有效方法
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.89
GaoJun Fan, Feng Liang, Shiyao Jin
One fundamental issue in application of wireless sensor networks is to provide proper coverage of their deployment regions, which answers the questions about the quality of service (surveillance or monitoring) that can be provided by a sensor network. In this paper, we consider the point-coverage problem where a given set of n points requires to be covered in the two-dimension (such as monitoring leakage of hazardous gaseous materials at ventilation points or observing the fixed location important targets). Our objective is to place the minimal number sensors such that coverage points in the field can be covered by at least k sensors. By combining computational geometry and combinatorics techniques, we investigate the issue from a different angle, demonstrate an important relationship between coverage points and sensors, and develop an efficient algorithm for 1-coverage problem. Finally, we indicate our approach can easily solve k-coverage problem based on 1-coverage.
无线传感器网络应用的一个基本问题是在其部署区域提供适当的覆盖,这回答了有关传感器网络可以提供的服务质量(监视或监控)的问题。在本文中,我们考虑在二维空间中需要覆盖给定n个点的点覆盖问题(如监测通风点的有害气体泄漏或观察固定位置的重要目标)。我们的目标是放置最少数量的传感器,以便至少k个传感器可以覆盖现场的覆盖点。结合计算几何和组合技术,从不同的角度研究了这一问题,证明了覆盖点与传感器之间的重要关系,并开发了一种有效的1-覆盖问题算法。最后,我们表明我们的方法可以很容易地解决基于1-覆盖的k-覆盖问题。
{"title":"An Efficient Approach for Point Coverage Problem of Sensor Network","authors":"GaoJun Fan, Feng Liang, Shiyao Jin","doi":"10.1109/ISECS.2008.89","DOIUrl":"https://doi.org/10.1109/ISECS.2008.89","url":null,"abstract":"One fundamental issue in application of wireless sensor networks is to provide proper coverage of their deployment regions, which answers the questions about the quality of service (surveillance or monitoring) that can be provided by a sensor network. In this paper, we consider the point-coverage problem where a given set of n points requires to be covered in the two-dimension (such as monitoring leakage of hazardous gaseous materials at ventilation points or observing the fixed location important targets). Our objective is to place the minimal number sensors such that coverage points in the field can be covered by at least k sensors. By combining computational geometry and combinatorics techniques, we investigate the issue from a different angle, demonstrate an important relationship between coverage points and sensors, and develop an efficient algorithm for 1-coverage problem. Finally, we indicate our approach can easily solve k-coverage problem based on 1-coverage.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"485 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Information Security Problem Research Based on Game Theory 基于博弈论的信息安全问题研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.147
Wei Sun, Xiangwei Kong, Dequan He, Xingang You
The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on evolutionary game theory. In this paper, we set up the information security game model with penalty parameter, calculate replicator dynamics, and analyze the evolutionary stable strategy of the game model. The result reveals that reducing the investment cost is the key factor to promote information security investment. If this condition can not be satisfied, the regulation of penalty parameter will help to promote the investment. The research method in this paper provides a new thought for the solution of information security in the mobile electronic commerce chain.
本文旨在解决移动电子商务产业链中的信息安全问题。基于进化博弈理论对信息安全进行了分析。本文建立了带有惩罚参数的信息安全博弈模型,计算了复制因子动力学,并分析了博弈模型的进化稳定策略。结果表明,降低投资成本是促进信息安全投资的关键因素。如果不能满足这一条件,调整惩罚参数有助于促进投资。本文的研究方法为解决移动电子商务链中的信息安全问题提供了一种新的思路。
{"title":"Information Security Problem Research Based on Game Theory","authors":"Wei Sun, Xiangwei Kong, Dequan He, Xingang You","doi":"10.1109/ISECS.2008.147","DOIUrl":"https://doi.org/10.1109/ISECS.2008.147","url":null,"abstract":"The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on evolutionary game theory. In this paper, we set up the information security game model with penalty parameter, calculate replicator dynamics, and analyze the evolutionary stable strategy of the game model. The result reveals that reducing the investment cost is the key factor to promote information security investment. If this condition can not be satisfied, the regulation of penalty parameter will help to promote the investment. The research method in this paper provides a new thought for the solution of information security in the mobile electronic commerce chain.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation 多层次关联在网络安全管理统一平台中的应用:设计与实现
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.85
Zheng Wu, Debao Xiao, Min Xiao, Xi Peng
Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.
预警关联是分析攻击之间的隐式关系,从而发现真实威胁的一种方法。目前已有几种基于预定义知识的预警关联方法和不需要预定义知识的预警关联方法。但它们都有缺点。通常,预定义的基于知识的方法无法识别未知攻击,而非预定义的基于知识的方法则缺乏多步骤攻击的分析能力。提出了一种应用于网络安全管理统一平台(UPNSM)的多级关联方法。该方法在分析多源警报时将上述两种方法结合在一起。目标是排除误报,提取真正的威胁并发现未知的攻击。实验表明,我们的多层相关建模和部署技术可以有效地实现这一目标。
{"title":"Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation","authors":"Zheng Wu, Debao Xiao, Min Xiao, Xi Peng","doi":"10.1109/ISECS.2008.85","DOIUrl":"https://doi.org/10.1109/ISECS.2008.85","url":null,"abstract":"Alert correlation is the method used to analyze the implicit relation among attacks so as to discover real threats. There already have been several proposals on alert correlation, such as the methods based on predefined knowledge and the methods need no predefined knowledge. But they all have their drawbacks. Generally, the predefined knowledge based methods have no ability to recognize unknown attacks, and the non predefined knowledge based methods lack the capability to analyze multistep attacks. This paper presents a multilevel correlation method used in the Unified Platform of Network Security Management (UPNSM). This method combines the two methods mentioned above together in analyzing multisource alerts. The goal is to pull out false positive, extract real threats and discover unknown attacks. Experiments show that our multilevel correlation modeling and deployment techniques are effective in achieving this goal.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Distributed Electronic Authentication Scheme in E-Business System 电子商务系统中的分布式电子认证方案
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.125
Xinxia Song, Zhigang Chen
A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.
提出了一种基于二次曲线的分布式电子商务认证方案。该方案由两个部分组成:构建许可证和验证许可证。由于许可证的安全性是由私钥而不是算法本身决定的,所以只要私钥不泄露,用户就不能根据给定的许可证和公钥构造新的许可证。由于二次曲线上的编码和解码在二次曲线上很容易实现,使我们的方案大大提高了效率。并对其安全性进行了分析。整个过程保证了安全性和可靠性。
{"title":"A Distributed Electronic Authentication Scheme in E-Business System","authors":"Xinxia Song, Zhigang Chen","doi":"10.1109/ISECS.2008.125","DOIUrl":"https://doi.org/10.1109/ISECS.2008.125","url":null,"abstract":"A distributed e-business authentication scheme based on conic curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic itself, user can not construct new license by given license and the public key as long as the private key is not leaked. Since encoding and decoding over conic are easily implement on conic curves, it has enabled our scheme to greatly enhance efficiency. We also analyse its security. The entire process guarantees the security and reliability.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System 基于两层贝叶斯网络的入侵检测系统异常检测模型
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.178
Huijuan Lu, Jianguo Chen, Wei Wei
An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.
入侵检测系统(IDS)试图通过将收集到的数据与已知的恶意预定义签名(基于签名的IDS)或合法行为模型(基于异常的IDS)进行比较来识别攻击。基于异常的方法的优点是能够检测到以前未知的攻击,但是它们在构建可接受行为的健壮模型方面存在困难,这可能导致大量的假警报。当前系统中错误的事件分类导致了大量的假警报,其中一个原因是决策阶段模型输出的简单聚合。另一个原因是缺乏将附加信息集成到决策过程中。针对这些不足,本文提出了一种基于两层贝叶斯网络的入侵检测系统异常检测和决策模型。贝叶斯网络改进了输出的聚合,例如经验数据,并允许人们无缝地合并其他信息。实验结果清楚地表明,我们的方法可以有效地提高基于异常的入侵检测和决策过程的准确性。
{"title":"Two Stratum Bayesian Network Based Anomaly Detection Model for Intrusion Detection System","authors":"Huijuan Lu, Jianguo Chen, Wei Wei","doi":"10.1109/ISECS.2008.178","DOIUrl":"https://doi.org/10.1109/ISECS.2008.178","url":null,"abstract":"An intrusion detection system (IDS) attempts to identify attacks by comparing collected data to predefined signatures known to be malicious (signature-based IDS) or to a model of legal behaviour (anomaly-based IDS). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms. Two reasons for the large number of false alarms, caused by incorrect classification of events in current systems, one is the simplistic aggregation of model outputs inthe decision phase. The other reason is the lack of integration of additional information into the decision process. To mitigate these shortcomings, this paper proposes a two stratum Bayesian networks based anomaly detection and decision model for intrusion detection system. Bayesian networks improve the aggregation of outputs, such as empirical data and allow one to seamlessly incorporate additional information. Experimental results clearly demonstrate the efficiency of our approach to improve the accuracy of the intrusion detection and decision process in an anomaly based IDS.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement 基于模糊度量的集群供应链供应商选择
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.162
Jizi Li, Baishu Li, Zhiping Li
Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.
集群式供应链运行过程中的不确定性提出了灵活性问题,其中供应前置时间和需求数量是集群式供应链中最常见的两个变化。针对集群式供应链的柔性问题,应用模糊集理论对变量进行表示,建立了集群式供应链柔性模型。在此基础上,提出了一种供应商选择方法。最后给出了一个实例进行说明。
{"title":"Selecting Supplier of Cluster Supply Chain Based on Fuzzy Measurement","authors":"Jizi Li, Baishu Li, Zhiping Li","doi":"10.1109/ISECS.2008.162","DOIUrl":"https://doi.org/10.1109/ISECS.2008.162","url":null,"abstract":"Uncertainty in operation process of cluster supply chain raises the issue of flexibility, where the supply lead-time and demand quantity are the two most common changes occurring in cluster supply chain. Focusing on the flexibility of cluster supply chain, the fuzzy set theory was applied to give the representation for the variables, and model the cluster supply chain flexibility. Besides it, a supplier selection method was developed. Finally, an illustrative example was given for demonstration.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Antecedents and Consequences of Process Innovation on E-Commerce 电子商务流程创新的前因后果
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.137
Wang Cheng, Lan Hailin, Xie Hongming
The purpose of this paper is to analyze a series of factors that affects innovation and demonstrate that innovation are positively related to performance during business process integration and re-engineering based on e-commerce. According to prior research, the paper develops a number of testable hypotheses. It examines how trust, coordination, process innovation influence improvements in performance. The paper uses structural equations modeling and empirically tests these hypotheses using a sample of 218 Chinese organizations. The findings consider that coordination plays a mediating role between trust and process innovation and process innovation plays a mediating role between coordination and organizational performance. Finally, implications for researchers and practitioners are presented.
本文的目的是分析一系列影响创新的因素,并证明在基于电子商务的业务流程整合与再造过程中,创新与绩效呈正相关。根据先前的研究,本文提出了一些可检验的假设。它考察了信任、协调、流程创新如何影响绩效的改进。本文采用结构方程模型,并以218家中国企业为样本进行实证检验。研究结果认为,协调在信任与流程创新之间起中介作用,过程创新在协调与组织绩效之间起中介作用。最后,提出了对研究人员和实践者的启示。
{"title":"Antecedents and Consequences of Process Innovation on E-Commerce","authors":"Wang Cheng, Lan Hailin, Xie Hongming","doi":"10.1109/ISECS.2008.137","DOIUrl":"https://doi.org/10.1109/ISECS.2008.137","url":null,"abstract":"The purpose of this paper is to analyze a series of factors that affects innovation and demonstrate that innovation are positively related to performance during business process integration and re-engineering based on e-commerce. According to prior research, the paper develops a number of testable hypotheses. It examines how trust, coordination, process innovation influence improvements in performance. The paper uses structural equations modeling and empirically tests these hypotheses using a sample of 218 Chinese organizations. The findings consider that coordination plays a mediating role between trust and process innovation and process innovation plays a mediating role between coordination and organizational performance. Finally, implications for researchers and practitioners are presented.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116956116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Algorithm of Obtaining Best Rules Based on Rough Set 基于粗糙集的最佳规则获取算法
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.14
Shulin Chen, Lei Wang
With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.
随着数据库技术和Internet技术的快速发展,信息过剩已成为电子商务决策者不得不面对的问题。本文首先对过量数据建立决策表,然后对决策表的知识进行约简,得到最优规则。这样可以减少数据的冗余,提高知识获取的效率。针对一般算法具有较高的时间复杂度和空间复杂度的问题,本文提出了一种基于类比矩阵的新算法,并对该算法进行了实现。实践证明,该算法能提高知识获取的效率,且规则整洁、优化。
{"title":"The Algorithm of Obtaining Best Rules Based on Rough Set","authors":"Shulin Chen, Lei Wang","doi":"10.1109/ISECS.2008.14","DOIUrl":"https://doi.org/10.1109/ISECS.2008.14","url":null,"abstract":"With the fast development of the technology in Database and Internet, excessive information has become a problem that decision makers engage in electronic commerce have to affront. This paper firstly establishes the decision table for excessive data, then reduces knowledge of the decision table, and obtains the best rules. This can reduce the redundancy of the data, and improve the efficiency of knowledge obtaining. Because of the high time complexity and spatial complexity the general algorithm has, this paper proposed a new algorithm based on analogical matrix, and carried out the algorithm. The practice proves that the algorithm can improve the efficiency of knowledge obtaining, and the rules is tidy and best.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Technologies for Security Enhancing of Payment Gateway 增强支付网关安全性的关键技术
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.37
Xuewang Zhang, Linlin Wang
The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.
安全的支付网关是保证电子商务发展的必要条件。MD5等哈希算法的破解给支付网关带来了巨大的安全隐患。提出了一种增强支付网关安全性的解决方案,并围绕融合SSL和SET的支付协议阐述了增强安全的主要关键技术:优化实现AES算法并集成到SSL协议中;基于优化后的AES建立安全哈希算法并集成到SSL协议中;设计实现安全代理和微权威证书(CA)系统。
{"title":"Key Technologies for Security Enhancing of Payment Gateway","authors":"Xuewang Zhang, Linlin Wang","doi":"10.1109/ISECS.2008.37","DOIUrl":"https://doi.org/10.1109/ISECS.2008.37","url":null,"abstract":"The secure payment gateway is necessary for ensuring the development of e-commerce. The breaking down of hash algorithm of MD5 and the like have imposed great potential security hazard on payment gateway. We have brought forward a kind of solution for enhancing the security of payment gateway and expounded the major key technique for security enhancing centering on the payment protocol which blends SSL and SET: optimize and realize AES algorithm and integrate it into SSL protocol, establish secure hash algorithm based on the optimized AES and integrate it into SSL protocol, design and implement security proxy and micro authority certificate (CA) system.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Electronic Time Stamping Safety and Efficiency Optimize Technique Research 电子时间戳安全与效率优化技术研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.11
Hong-Jiao Ma, Yu Hua, Wei Guo
Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.
恒信国际时间戳认证机构是由国家时间服务中心(NTSC)和恒信国际于2007年共同组建的值得信赖的专业时间戳服务机构。本文介绍了可信时间戳技术在中国电子商务、电子政务和数字知识产权领域的应用现状。详细分析了数字时间戳服务系统的结构和设计方法。讨论了提高可信时间戳安全性和优化效率的方法。
{"title":"Electronic Time Stamping Safety and Efficiency Optimize Technique Research","authors":"Hong-Jiao Ma, Yu Hua, Wei Guo","doi":"10.1109/ISECS.2008.11","DOIUrl":"https://doi.org/10.1109/ISECS.2008.11","url":null,"abstract":"Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-commerce, e-government and digital intellectual property rights in China at present is introduced in this paper. The structure and design method of the digital time stamp service system are analyzed in detail. The method for improving security and optimize efficiency of trusted time stamping are discussed.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"411 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 International Symposium on Electronic Commerce and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1