The reputation problem is one of the main bottleneck problems for e-commerce. To a certain extent, the credit evaluation systems provided by C2C e-commerce websites guarantee the safety of transactions on Internet, and promote people's online shopping wishes. This paper first introduces existing credit evaluation model for C2C e-commerce, and analyzes the major problems in it. Then an improved credit evaluation model for C2C e-commerce is created. Based on the improved model, a new weighted rating algorithm is proposed to reflect the influence of evaluation-provider's credit and the amount of a transaction on the change of the evaluation-receiver's credit. And a new credit updating algorithm is described. The new credit evaluation model is validated using synthetic data.
{"title":"Study on Credit Evaluation Model and Algorithm for C2C E-Commerce","authors":"Chunhui Piao, Jing An, Meiqi Fang","doi":"10.1109/ICEBE.2007.77","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.77","url":null,"abstract":"The reputation problem is one of the main bottleneck problems for e-commerce. To a certain extent, the credit evaluation systems provided by C2C e-commerce websites guarantee the safety of transactions on Internet, and promote people's online shopping wishes. This paper first introduces existing credit evaluation model for C2C e-commerce, and analyzes the major problems in it. Then an improved credit evaluation model for C2C e-commerce is created. Based on the improved model, a new weighted rating algorithm is proposed to reflect the influence of evaluation-provider's credit and the amount of a transaction on the change of the evaluation-receiver's credit. And a new credit updating algorithm is described. The new credit evaluation model is validated using synthetic data.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127078149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsourced data can be accessed by several parties, the managing of discretionary access control to it becomes a very important issue. In this paper we present an approach that uses selective encryption for managing discretionary read/write access to the data that describe tagged objects and are submitted by a number of parties to a central datastore. Our approach does not reveal relationships between the parties and allows efficient dynamic assignment of read permissions. We proceed with presenting experimental performance results and based on them discuss the applicability of our approach to practical scenarios.
{"title":"Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain","authors":"S. Evdokimov, O. Günther","doi":"10.1109/ICEBE.2007.85","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.85","url":null,"abstract":"To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsourced data can be accessed by several parties, the managing of discretionary access control to it becomes a very important issue. In this paper we present an approach that uses selective encryption for managing discretionary read/write access to the data that describe tagged objects and are submitted by a number of parties to a central datastore. Our approach does not reveal relationships between the parties and allows efficient dynamic assignment of read permissions. We proceed with presenting experimental performance results and based on them discuss the applicability of our approach to practical scenarios.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During the past decade, information systems investment has grown rapidly worldwide and information systems project development has become one of the most important targets in e-business. Yet, the failure of information systems projects is a common occurrence in many organizations around the world. A theoretical model is derived based upon organizational learning theory and prior research in order to examine the effects of organizational learning on lack of team's expertise risk. A survey method is applied to test the hypotheses proposed by the research model, and Taiwanese corporate companies serve as examples. After survey by questionnaire and analyze the data by structure equation modeling, the result reveals that organizational learning has significantly negative impacts on all of the lack of development expertise risk, lack of domain expertise risk, and lack of general expertise risk. These findings support information systems managers with valuable information to revisit their priorities in terms of the relative efforts in organization learning.
{"title":"The Impact of Organizational Learning on Lack of Team's Expertise Risk in Information Systems Projects","authors":"Chun-Hui Wu, Kwoting Fang","doi":"10.1109/ICEBE.2007.19","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.19","url":null,"abstract":"During the past decade, information systems investment has grown rapidly worldwide and information systems project development has become one of the most important targets in e-business. Yet, the failure of information systems projects is a common occurrence in many organizations around the world. A theoretical model is derived based upon organizational learning theory and prior research in order to examine the effects of organizational learning on lack of team's expertise risk. A survey method is applied to test the hypotheses proposed by the research model, and Taiwanese corporate companies serve as examples. After survey by questionnaire and analyze the data by structure equation modeling, the result reveals that organizational learning has significantly negative impacts on all of the lack of development expertise risk, lack of domain expertise risk, and lack of general expertise risk. These findings support information systems managers with valuable information to revisit their priorities in terms of the relative efforts in organization learning.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the advent of multicores and XML, we face the mounting need of processing XML documents efficiently on multicores. Because XSLT (extensible stylesheet language for transformation) is the principal programming language to transform one XML document into another, we design and implement a novel and powerful XSLT engine based on multicores. Since XSLT is declarative and functional, implicit parallelism abounds in XSLT processing. This paper addresses the challenges to map such parallelism to various execution models and to exploit these mappings with optimal granularities. We develop four parallel execution models for XML transformations: fork, fork-join, data-parallel, and future. These models are our building blocks for data and computation decompositions unto multicores. Not only are we the first to formulate them on top of the building blocks, we also demonstrate how to efficiently exploit implicit, dynamic and nested parallelism with both compile-time estimation and profile-based adaptation on granularity. Finally, we present the first-ever evaluation of a parallel XSLT engine on multicore processors. The performance analysis shows that our parallel XSLT engine is scalable for most XSLT programs in real-world usage.
{"title":"Parallel XML Transformations on Multi-Core Processors","authors":"Yuanhao Sun, Tianyou Li, Qi Zhang, Jia Yang, Shih-Wei Liao","doi":"10.1109/ICEBE.2007.110","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.110","url":null,"abstract":"With the advent of multicores and XML, we face the mounting need of processing XML documents efficiently on multicores. Because XSLT (extensible stylesheet language for transformation) is the principal programming language to transform one XML document into another, we design and implement a novel and powerful XSLT engine based on multicores. Since XSLT is declarative and functional, implicit parallelism abounds in XSLT processing. This paper addresses the challenges to map such parallelism to various execution models and to exploit these mappings with optimal granularities. We develop four parallel execution models for XML transformations: fork, fork-join, data-parallel, and future. These models are our building blocks for data and computation decompositions unto multicores. Not only are we the first to formulate them on top of the building blocks, we also demonstrate how to efficiently exploit implicit, dynamic and nested parallelism with both compile-time estimation and profile-based adaptation on granularity. Finally, we present the first-ever evaluation of a parallel XSLT engine on multicore processors. The performance analysis shows that our parallel XSLT engine is scalable for most XSLT programs in real-world usage.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134479436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As Web applications take the centre-stage of today's businesses, core business processes are increasingly automated using Web technologies. We advocate agile model driven development (AMDD) for streamlining the development, and end-user development (EUD) for managing the evolution of Web-based workflow applications. In this paper, we will demonstrate how such approach is realised through the smart business object (SBO) technology and the lightweight business process flow (LBPF) engine we have developed. The synergy between the two enables a parallel mode of development where developers can generate and release the intended application within an extremely compressed timeframe, while business end-users can subsequently manage the evolution of their Web-based workflow applications in a controlled environment via Web-based tools.
{"title":"Facilitating Agile Model Driven Development and End-User Development for EvolvingWeb-basedWorkflow Applications","authors":"Xufeng Liang, Ioakim Marmaridis, A. Ginige","doi":"10.1109/ICEBE.2007.37","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.37","url":null,"abstract":"As Web applications take the centre-stage of today's businesses, core business processes are increasingly automated using Web technologies. We advocate agile model driven development (AMDD) for streamlining the development, and end-user development (EUD) for managing the evolution of Web-based workflow applications. In this paper, we will demonstrate how such approach is realised through the smart business object (SBO) technology and the lightweight business process flow (LBPF) engine we have developed. The synergy between the two enables a parallel mode of development where developers can generate and release the intended application within an extremely compressed timeframe, while business end-users can subsequently manage the evolution of their Web-based workflow applications in a controlled environment via Web-based tools.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Search engine is one of the reasons for e-commerce success in today's world. They are playing an important role in supplying both international and local communities with various dimensions of business information for the customers and other interested parties. In Thailand, two of the most popular and successful Thai search engines are Sanook.com and Hunsa.com at httv://www.sanook.com and httv://www.hunsa. com respectively. This study aims to analyse their business strategies and models including related aspects through a qualitative approach. The study was based on interviews with the CEO or CIO of the companies and individuals who have particular interests in search engines and assessment of the Websites. The research outcomes cover the search engine companies' background, business strategies and models; industry, competitors and environmental analysis; key business drivers and threats. The study also covers innovation factors and adoption including Website assessment through evaluation of the search engines and their future development.
{"title":"E-business in Thailand: A Case Study of Two Thai Search Engine Companies","authors":"V. Chooprayoon, L. Fung, A. Depickere","doi":"10.1109/ICEBE.2007.66","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.66","url":null,"abstract":"Search engine is one of the reasons for e-commerce success in today's world. They are playing an important role in supplying both international and local communities with various dimensions of business information for the customers and other interested parties. In Thailand, two of the most popular and successful Thai search engines are Sanook.com and Hunsa.com at httv://www.sanook.com and httv://www.hunsa. com respectively. This study aims to analyse their business strategies and models including related aspects through a qualitative approach. The study was based on interviews with the CEO or CIO of the companies and individuals who have particular interests in search engines and assessment of the Websites. The research outcomes cover the search engine companies' background, business strategies and models; industry, competitors and environmental analysis; key business drivers and threats. The study also covers innovation factors and adoption including Website assessment through evaluation of the search engines and their future development.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121094161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service orchestration logics can be difficult to be totally pre-fabricated as composite services when facing uncertain requirements. It is sometimes indispensable to get end users involved. However, we should not expect end users do programming as computer professionals. They should be refrained from the difficulties in selecting suitable services, jointing the inputs and outputs, and assuring correctness and consistence. It is thus important to provide them proper assistance and guidance. In this paper, we propose a service hyperlink model. The model facilitates flexible and rapid construction without having to overload end-users with too much work. We illustrate how service hyperlinks facilitate exploratory service composition with the following instruments: 1) recommendation of service hyperlinks. 2) automatic generation of message mappings. 3) automatic validity checking. The usage of the proposed model is verified in a typical bioinformatics scenario. The preliminary results demonstrate that our efforts help.
{"title":"\"Service Hyperlink\" for Exploratory Service Composition","authors":"Shuying Yan, Yanbo Han, Jing Wang, Chen Liu","doi":"10.1109/ICEBE.2007.91","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.91","url":null,"abstract":"Service orchestration logics can be difficult to be totally pre-fabricated as composite services when facing uncertain requirements. It is sometimes indispensable to get end users involved. However, we should not expect end users do programming as computer professionals. They should be refrained from the difficulties in selecting suitable services, jointing the inputs and outputs, and assuring correctness and consistence. It is thus important to provide them proper assistance and guidance. In this paper, we propose a service hyperlink model. The model facilitates flexible and rapid construction without having to overload end-users with too much work. We illustrate how service hyperlinks facilitate exploratory service composition with the following instruments: 1) recommendation of service hyperlinks. 2) automatic generation of message mappings. 3) automatic validity checking. The usage of the proposed model is verified in a typical bioinformatics scenario. The preliminary results demonstrate that our efforts help.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a preliminary effort on visualization and analysis of social networks for online marketplaces. We use one of the most popular e-business models, eBay, as a case study. By extracting relevant data, we generate tree structure displays using 'Prefuse' interactive visualization toolkit, and study the social interaction among sellers and buyers, across geographical boundaries. We also illustrate how this study can improvise our understanding of online customer interaction patterns. Such an analysis could lead to possible enhancements to the current e-business models.
{"title":"Social Network Analysis of Online Marketplaces","authors":"Pushpa Kumar, Kang Zhang","doi":"10.1109/ICEBE.2007.27","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.27","url":null,"abstract":"This paper presents a preliminary effort on visualization and analysis of social networks for online marketplaces. We use one of the most popular e-business models, eBay, as a case study. By extracting relevant data, we generate tree structure displays using 'Prefuse' interactive visualization toolkit, and study the social interaction among sellers and buyers, across geographical boundaries. We also illustrate how this study can improvise our understanding of online customer interaction patterns. Such an analysis could lead to possible enhancements to the current e-business models.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115830175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web service composition is an emerging paradigm for enabling application integration within and across organizational boundaries. Model checking is a promising technique for the verification and validation of software systems. In this paper, we present a model checking framework to specifying and verifying the compositions of Web services workflow based on BPEL4WS (Business Process Execution Language for Web Services). By using annotation layers, a BPEL4WS model can be extended with constraints (properties) information. An underlying BPEL4WS model and one or more constraint annotation layers compose a complete specification of a business process imposed specific constraints. By transforming the annotated BPEL4WS model to an extended TPPN(Timed Predicate Petri-net) model, a business process can be automatically verified and analyzed. The method allows us to add conveniently constraints information to a business process model, and state whether a process satisfies given properties without actual execution based on its specification.
Web服务组合是一种新兴的范例,用于支持组织边界内和跨组织边界的应用程序集成。模型检查是一种很有前途的软件系统验证技术。本文提出了一个基于BPEL4WS (Web services Business Process Execution Language for Web services)的模型检查框架,用于指定和验证Web服务工作流的组成。通过使用注释层,可以用约束(属性)信息扩展BPEL4WS模型。底层BPEL4WS模型和一个或多个约束注释层构成了强加特定约束的业务流程的完整规范。通过将带注释的BPEL4WS模型转换为扩展的TPPN(定时谓词Petri-net)模型,可以自动验证和分析业务流程。该方法允许我们方便地向业务流程模型添加约束信息,并声明流程是否满足给定的属性,而无需根据其规范实际执行。
{"title":"A Framework for Model Checking Web Service Compositions Based on BPEL4WS","authors":"Guilan Dai, Xiaoying Bai, Chongchong Zhao","doi":"10.1109/ICEBE.2007.11","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.11","url":null,"abstract":"Web service composition is an emerging paradigm for enabling application integration within and across organizational boundaries. Model checking is a promising technique for the verification and validation of software systems. In this paper, we present a model checking framework to specifying and verifying the compositions of Web services workflow based on BPEL4WS (Business Process Execution Language for Web Services). By using annotation layers, a BPEL4WS model can be extended with constraints (properties) information. An underlying BPEL4WS model and one or more constraint annotation layers compose a complete specification of a business process imposed specific constraints. By transforming the annotated BPEL4WS model to an extended TPPN(Timed Predicate Petri-net) model, a business process can be automatically verified and analyzed. The method allows us to add conveniently constraints information to a business process model, and state whether a process satisfies given properties without actual execution based on its specification.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123023564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and access control policies specifying what credentials a stranger must submit in the open and distributed environment. While ATN brings convenience, there are still two issues unsolved successfully: 1) to protect the transmitting message; 2) to prevent the sensitive information leakage. Hidden credential can provide high security level to protect sensitive resources, policies and credentials from being attacked. Zero-knowledge is an important means to avoid leakage and can be used to protect the user's private context and sensitive information from unauthorized inferences. If hidden credentials and zero-knowledge are well-combined and redesigned, they can jointly make ATN better. Based on these, a hidden credential based oblivious automated trust negotiation model (HBOA) is proposed in this paper. In the model, the negotiation information is carried by hidden credentials, which have the same secure level with elliptic curve. Zero-knowledge protocol is provided by Pedersen commitment scheme, which ensures that no sensitive information can be attained by authorized users. A practical example is given to prove its usability.
{"title":"A Hidden Credential Based Oblivious Automated Trust Negotiation Model","authors":"Zhensong Liao, Hai Jin, Deqing Zou","doi":"10.1109/ICEBE.2007.59","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.59","url":null,"abstract":"Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and access control policies specifying what credentials a stranger must submit in the open and distributed environment. While ATN brings convenience, there are still two issues unsolved successfully: 1) to protect the transmitting message; 2) to prevent the sensitive information leakage. Hidden credential can provide high security level to protect sensitive resources, policies and credentials from being attacked. Zero-knowledge is an important means to avoid leakage and can be used to protect the user's private context and sensitive information from unauthorized inferences. If hidden credentials and zero-knowledge are well-combined and redesigned, they can jointly make ATN better. Based on these, a hidden credential based oblivious automated trust negotiation model (HBOA) is proposed in this paper. In the model, the negotiation information is carried by hidden credentials, which have the same secure level with elliptic curve. Zero-knowledge protocol is provided by Pedersen commitment scheme, which ensures that no sensitive information can be attained by authorized users. A practical example is given to prove its usability.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117319450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}