The secure and practical Internet voting protocols should have: privacy, completeness, soundness, unreusability, fairness, eligibility, and invariableness, universal verifiability, receipt-free, coercion-resistant. Research on the Internet voting protocol is focusing on the implementation of these properties without strong physical assumptions. In this paper, first, invariableness is proposed. Secondly, we analyze the typical protocols according to properties. Thirdly, we give an improvement of a famous Internet voting protocol. In the last we analyze it and prove that the improved protocol is receipt-free with Jonker-Vink receipt-freeness formal model.
{"title":"Analyzing and Improving Internet Voting Protocol","authors":"Bo Meng","doi":"10.1109/ICEBE.2007.13","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.13","url":null,"abstract":"The secure and practical Internet voting protocols should have: privacy, completeness, soundness, unreusability, fairness, eligibility, and invariableness, universal verifiability, receipt-free, coercion-resistant. Research on the Internet voting protocol is focusing on the implementation of these properties without strong physical assumptions. In this paper, first, invariableness is proposed. Secondly, we analyze the typical protocols according to properties. Thirdly, we give an improvement of a famous Internet voting protocol. In the last we analyze it and prove that the improved protocol is receipt-free with Jonker-Vink receipt-freeness formal model.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wanghu Chen, Yanbo Han, Chen Liu, Jing Wang, Shuying Yan
To make service matchmaking more adaptive to various service requests and diverse services, an abstract service model called ASM-TL is proposed in this paper. ASM-TL provides a unified way to describing service capabilities. It can describe some important factors affecting service capabilities such as internal constraints, invocation constraints and operation interactions. Moreover, ASM-TL also lays a foundation for service reasoning by providing a process model, which represents states transition, message transferring and temporal properties of a service. Thus, treating service requests as temporal conditions, service matchmaking can be done through model checking and is more adaptive to various service requests and diverse services. ASM-TL has been applied to the problem solving environment for bioinformatics research. Analysis and applications show ASM-TL is effective to enable adaptive service matchmaking.
{"title":"ASM-TL: an Abstract Service Model Enabling Adaptive Matchmaking","authors":"Wanghu Chen, Yanbo Han, Chen Liu, Jing Wang, Shuying Yan","doi":"10.1109/ICEBE.2007.90","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.90","url":null,"abstract":"To make service matchmaking more adaptive to various service requests and diverse services, an abstract service model called ASM-TL is proposed in this paper. ASM-TL provides a unified way to describing service capabilities. It can describe some important factors affecting service capabilities such as internal constraints, invocation constraints and operation interactions. Moreover, ASM-TL also lays a foundation for service reasoning by providing a process model, which represents states transition, message transferring and temporal properties of a service. Thus, treating service requests as temporal conditions, service matchmaking can be done through model checking and is more adaptive to various service requests and diverse services. ASM-TL has been applied to the problem solving environment for bioinformatics research. Analysis and applications show ASM-TL is effective to enable adaptive service matchmaking.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"52 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126919716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a new approach for the management and engineering of IT-enabled services. Based on the analysis of several real world application scenarios, we propose a "deep structure" for IT- enabled service management. We introduce the concept of a business artifact in defining this deep structure. We leverage this deep structure in conjunction with representational state transfer (REST) to design and build a platform for service management. Our approach radically simplifies the management and engineering of IT-enabled services and provides a highly flexible and end-user configurable system for service management.
{"title":"The Deep Structure of Service Management","authors":"S. Kumaran, Yingjie Li, P. Dhoolia","doi":"10.1109/ICEBE.2007.100","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.100","url":null,"abstract":"This paper presents a new approach for the management and engineering of IT-enabled services. Based on the analysis of several real world application scenarios, we propose a \"deep structure\" for IT- enabled service management. We introduce the concept of a business artifact in defining this deep structure. We leverage this deep structure in conjunction with representational state transfer (REST) to design and build a platform for service management. Our approach radically simplifies the management and engineering of IT-enabled services and provides a highly flexible and end-user configurable system for service management.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115612336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite considerable research on ontologies for representing requirements models (and metamodels), little progress has been made in using ontologies to represent non-functional requirements. Non-functional requirements define the overall qualities of the resulting system. Because they are restrictions on system services, non-functional requirements are often of critical importance, and functional requirements may need to be sacrificed to meet them. However, because of their diverse nature, non-functional requirements are often expressed in non-standard domain-specific ways. This paper describes a nonfunctional requirements ontology that can be used to structure and express constraints as part of quality of service specification. The approach is illustrated using a small case-study.
{"title":"A Domain-Independent Ontology for Non-Functional Requirements","authors":"G. Dobson, S. Hall, G. Kotonya","doi":"10.1109/ICEBE.2007.76","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.76","url":null,"abstract":"Despite considerable research on ontologies for representing requirements models (and metamodels), little progress has been made in using ontologies to represent non-functional requirements. Non-functional requirements define the overall qualities of the resulting system. Because they are restrictions on system services, non-functional requirements are often of critical importance, and functional requirements may need to be sacrificed to meet them. However, because of their diverse nature, non-functional requirements are often expressed in non-standard domain-specific ways. This paper describes a nonfunctional requirements ontology that can be used to structure and express constraints as part of quality of service specification. The approach is illustrated using a small case-study.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"131 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130779795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The existing e-business systems were always analyzed and designed by the constraints of hardware and software environment. As it says, e-business systems are machine centered. So, it means a user has to do work abiding by a computer system. A computer system can't provide good services for a user. In this paper a human-centered e-business system analysis and modeling method is put forward in order to make an e-business system to provide high quality services for a user. The process and examples of this method are presented in the paper.
{"title":"A Human-Centered e-Business System Analysis and Modeling Method","authors":"Lixin Zhou","doi":"10.1109/ICEBE.2007.53","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.53","url":null,"abstract":"The existing e-business systems were always analyzed and designed by the constraints of hardware and software environment. As it says, e-business systems are machine centered. So, it means a user has to do work abiding by a computer system. A computer system can't provide good services for a user. In this paper a human-centered e-business system analysis and modeling method is put forward in order to make an e-business system to provide high quality services for a user. The process and examples of this method are presented in the paper.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125602679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In an enterprise, managing and processing an electronic contract often involves a number of contract administrators and representatives in the enterprise, and their counter parts in their suppliers, business partners or their customers to carry out a large number of complex manual tasks in sequences during the life cycle of electronic contract. In most commercially available electronic contract management systems, users either waste a lot of their time in monitoring their task lists for their turns to act on their electronic contracts or most electronic contracts simply stay idle for most of the time if users only check their task lists once a while. In addition, these manual tasks are often tedious and may cause security faults. In this paper, we present a Web-based and email driven electronic contract management system that supports both internal and intra-enterprises workflows, and with multi-tenants hosting capability. This system enables a user to act on the next task in a sequence of tasks to process a particular electronic contract immediately after the other user has completed the previous task in the same sequence of tasks by sending out email notifications to alert or remind the user to take action on the task. We also describe several novel methods to automate some manual and tedious tasks, such as watermarking signature information on the signed electronic contract and life cycle management, in this paper. Most users have found their productivities improved, the electronic contract transaction time accelerated, contractual errors reduced and many other benefits by using this electronic contract management system in several IBM pilot programs.
{"title":"A Web-based and Email Driven Electronic Contract Management System","authors":"T. Kwok, Thao Nguyen, L. Lam, T. Chieu","doi":"10.1109/ICEBE.2007.23","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.23","url":null,"abstract":"In an enterprise, managing and processing an electronic contract often involves a number of contract administrators and representatives in the enterprise, and their counter parts in their suppliers, business partners or their customers to carry out a large number of complex manual tasks in sequences during the life cycle of electronic contract. In most commercially available electronic contract management systems, users either waste a lot of their time in monitoring their task lists for their turns to act on their electronic contracts or most electronic contracts simply stay idle for most of the time if users only check their task lists once a while. In addition, these manual tasks are often tedious and may cause security faults. In this paper, we present a Web-based and email driven electronic contract management system that supports both internal and intra-enterprises workflows, and with multi-tenants hosting capability. This system enables a user to act on the next task in a sequence of tasks to process a particular electronic contract immediately after the other user has completed the previous task in the same sequence of tasks by sending out email notifications to alert or remind the user to take action on the task. We also describe several novel methods to automate some manual and tedious tasks, such as watermarking signature information on the signed electronic contract and life cycle management, in this paper. Most users have found their productivities improved, the electronic contract transaction time accelerated, contractual errors reduced and many other benefits by using this electronic contract management system in several IBM pilot programs.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we will introduce the concept of trustworthy Service Oriented Architecture (SOA) for enabling intelligent and yet trustworthy pervasive service solutions. In pervasive services enabled e- logistics, trustworthiness establishment is usually under resource constraints, presenting challenges for mutual trust establishment as well as system dependability. In this paper we will present a trustworthy service framework. A demonstration of this framework is through realizing a smart marketing solution in a supermarket.
{"title":"SOA-Trust: Towards Developing Trustworthy RFID Enabled Intelligent Service Solutions","authors":"Zongwei Luo, Jenny S. Li, E. Wong","doi":"10.1109/ICEBE.2007.32","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.32","url":null,"abstract":"In this paper, we will introduce the concept of trustworthy Service Oriented Architecture (SOA) for enabling intelligent and yet trustworthy pervasive service solutions. In pervasive services enabled e- logistics, trustworthiness establishment is usually under resource constraints, presenting challenges for mutual trust establishment as well as system dependability. In this paper we will present a trustworthy service framework. A demonstration of this framework is through realizing a smart marketing solution in a supermarket.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124090727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aligning adequately business requirements and software functionality as well as achieving 'loose coupling' for service functionalities, are identified challenges relevant to service-oriented software design. Furthering previous related work, we propose in this paper an application design process that, taking the above challenges into account, addresses systematically and separately business requirements, the identification of (desirable) service functionalities, and their mapping onto technology platforms. With respect to service modeling, a communication pattern has been identified that is relevant and useful. As for the enforcement of social restrictions in the application functionality, semiotic norms are helpfully applied. And finally, 'loose coupling' is achieved in an orchestration-driven way.
{"title":"Model-Driven Specification of Software Services","authors":"B. Shishkov, M. V. Sinderen, B. Tekinerdogan","doi":"10.1109/ICEBE.2007.86","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.86","url":null,"abstract":"Aligning adequately business requirements and software functionality as well as achieving 'loose coupling' for service functionalities, are identified challenges relevant to service-oriented software design. Furthering previous related work, we propose in this paper an application design process that, taking the above challenges into account, addresses systematically and separately business requirements, the identification of (desirable) service functionalities, and their mapping onto technology platforms. With respect to service modeling, a communication pattern has been identified that is relevant and useful. As for the enforcement of social restrictions in the application functionality, semiotic norms are helpfully applied. And finally, 'loose coupling' is achieved in an orchestration-driven way.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Publish/subscribe service can deliver customized events and increase product visibility for users in RFID applications such as logistics supporting systems. This paper herein presents a composite subscription specification for RFID- related application scenarios, permitting to subscribe predicates for RFID-codes as well as temporal events. Moreover, an effective matching algorithm for RFID-code subscriptions together with a corresponding algorithm for detecting complex events is proposed. Finally, experiments are conducted to quantify the performances and costs of the above algorithms.
{"title":"Subscribing and Matching RFID-Related Events","authors":"Beihong Jin, Shuang Yu, Xinchao Zhao, Zhenyue Long, Yifeng Qian","doi":"10.1109/ICEBE.2007.36","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.36","url":null,"abstract":"Publish/subscribe service can deliver customized events and increase product visibility for users in RFID applications such as logistics supporting systems. This paper herein presents a composite subscription specification for RFID- related application scenarios, permitting to subscribe predicates for RFID-codes as well as temporal events. Moreover, an effective matching algorithm for RFID-code subscriptions together with a corresponding algorithm for detecting complex events is proposed. Finally, experiments are conducted to quantify the performances and costs of the above algorithms.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114797846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Business agility usually requires dynamic business process management. For example, business process outsourcing (BPO), often needs partition an existing BPEL- described business process into a number of sub-processes, which can be run at different business partners' in a decentralized way. However, how to effectively partition BPEL processes is still a challenging issue. In this paper, we propose a data flow optimization based BPEL process partitioning approach. Firstly, the messages used in the BPEL processes are transformed into asynchronously transmitted variables. Then, the transformed BPEL process is represented as a parallel flow graph (PFG), and is optimized through data flow analysis. Finally, the business process is partitioned based on the optimized PFG. Experimental results have demonstrated that the workload of message transmission and the response time are all effectively reduced.
{"title":"A Data Flow Optimization Based Approach for BPEL Processes Partition","authors":"Yanlong Zhai, H. Su, Shouyi Zhan","doi":"10.1109/ICEBE.2007.47","DOIUrl":"https://doi.org/10.1109/ICEBE.2007.47","url":null,"abstract":"Business agility usually requires dynamic business process management. For example, business process outsourcing (BPO), often needs partition an existing BPEL- described business process into a number of sub-processes, which can be run at different business partners' in a decentralized way. However, how to effectively partition BPEL processes is still a challenging issue. In this paper, we propose a data flow optimization based BPEL process partitioning approach. Firstly, the messages used in the BPEL processes are transformed into asynchronously transmitted variables. Then, the transformed BPEL process is represented as a parallel flow graph (PFG), and is optimized through data flow analysis. Finally, the business process is partitioned based on the optimized PFG. Experimental results have demonstrated that the workload of message transmission and the response time are all effectively reduced.","PeriodicalId":184487,"journal":{"name":"IEEE International Conference on e-Business Engineering (ICEBE'07)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115144842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}