Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287357
Wan-Song Zhang, Daxin Liu, J. Li
E-services are becoming a promising technology for the effective automation of application integration across the Web. They build upon XML, as data format for exchanging messages between applications. Accompanied with WSDL, UDDI, and SOAP, XML has clearly influenced positively the development of applications running on the Web. As the basic technology, indexing scheme for XML data have been studied in recent years to optimize path query processing by summarizing path information. However, most of these schemes based on tree traversals may not meet the processing requirements under heavy access requests. In this paper, we proposed a new scheme for indexing XML data using encoding elements, termed ES-index, and its algorithms. This encoding scheme quickly determines the siblings-siblings and ancestor-descendant relationship in hierarchy of XML data. Our experiment results over a wide range of XML documents demonstrate that ES-index structure is efficient for data access.
{"title":"An encoding scheme for indexing XML data","authors":"Wan-Song Zhang, Daxin Liu, J. Li","doi":"10.1109/EEE.2004.1287357","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287357","url":null,"abstract":"E-services are becoming a promising technology for the effective automation of application integration across the Web. They build upon XML, as data format for exchanging messages between applications. Accompanied with WSDL, UDDI, and SOAP, XML has clearly influenced positively the development of applications running on the Web. As the basic technology, indexing scheme for XML data have been studied in recent years to optimize path query processing by summarizing path information. However, most of these schemes based on tree traversals may not meet the processing requirements under heavy access requests. In this paper, we proposed a new scheme for indexing XML data using encoding elements, termed ES-index, and its algorithms. This encoding scheme quickly determines the siblings-siblings and ancestor-descendant relationship in hierarchy of XML data. Our experiment results over a wide range of XML documents demonstrate that ES-index structure is efficient for data access.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125695852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287316
R. Martí, J. Delgado, X. Perramon
Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.
{"title":"Security specification and implementation for mobile e-health services","authors":"R. Martí, J. Delgado, X. Perramon","doi":"10.1109/EEE.2004.1287316","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287316","url":null,"abstract":"Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121486585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287337
M. Enzmann, Markus Schneider
Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Beside potential benefits of loyalty systems, customers may fear an invasion of privacy, and thus often refuse to participate in such programs. We present two variants of a privacy-friendly loyalty system to be used by online vendors for issuing loyalty points. The systems prevent vendors from exploiting data for the creation of customer profiles by providing unconditional unlinkability of loyalty points with regard to purchases. We propose a simple token-based approach and a counter-based approach which is much more efficient while preserving the privacy and security properties. Furthermore, the counter-based loyalty system prevents pooling of loyalty points issued to distinct customers.
{"title":"A privacy-friendly loyalty system for electronic marketplaces","authors":"M. Enzmann, Markus Schneider","doi":"10.1109/EEE.2004.1287337","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287337","url":null,"abstract":"Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Beside potential benefits of loyalty systems, customers may fear an invasion of privacy, and thus often refuse to participate in such programs. We present two variants of a privacy-friendly loyalty system to be used by online vendors for issuing loyalty points. The systems prevent vendors from exploiting data for the creation of customer profiles by providing unconditional unlinkability of loyalty points with regard to purchases. We propose a simple token-based approach and a counter-based approach which is much more efficient while preserving the privacy and security properties. Furthermore, the counter-based loyalty system prevents pooling of loyalty points issued to distinct customers.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287321
Chun-Te Chen, Te-Chung Lu
Mobile commerce is becoming increasingly important in business. We find the e-ticket to be a popular way of implementing m-com. In order to solve some authentication drawback we propose a mobile ticket validation method using VSS (Visual Secret Sharing) technology with a time-stamp protocol on the mobile environment. The VSS encryption technology separates the ticket into two parts; one part of the ticket is sent to the user after purchasing. The other part is sent to the user when the time-stamp is reached. The time-stamp protocol can provide secure and fast verification. In our validation method, we offer lightweight load for a mobile device and simple identification work.
{"title":"A mobile ticket validation by VSS tech with time-stamp","authors":"Chun-Te Chen, Te-Chung Lu","doi":"10.1109/EEE.2004.1287321","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287321","url":null,"abstract":"Mobile commerce is becoming increasingly important in business. We find the e-ticket to be a popular way of implementing m-com. In order to solve some authentication drawback we propose a mobile ticket validation method using VSS (Visual Secret Sharing) technology with a time-stamp protocol on the mobile environment. The VSS encryption technology separates the ticket into two parts; one part of the ticket is sent to the user after purchasing. The other part is sent to the user when the time-stamp is reached. The time-stamp protocol can provide secure and fast verification. In our validation method, we offer lightweight load for a mobile device and simple identification work.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134233857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287288
Roy Grønmo, D. Skogan, I. Solheim, Jon Oldevik
Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of Web service technologies. The unified modeling language (UML) and the model driven architecture (MDA)/spl trade/ provide a framework that can be applied to Web service development. We describe a model-driven Web service development process, where Web service descriptions are imported into UML models; integrated into composite Web services; and the new Web service descriptions are exported. The main contributions are conversion rules between UML and Web services described by Web service description language (WSDL) documents and XML schema.
{"title":"Model-driven Web services development","authors":"Roy Grønmo, D. Skogan, I. Solheim, Jon Oldevik","doi":"10.1109/EEE.2004.1287288","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287288","url":null,"abstract":"Web service technologies are becoming increasingly important for integrating systems and services. There is much activity and interest around standardization and usage of Web service technologies. The unified modeling language (UML) and the model driven architecture (MDA)/spl trade/ provide a framework that can be applied to Web service development. We describe a model-driven Web service development process, where Web service descriptions are imported into UML models; integrated into composite Web services; and the new Web service descriptions are exported. The main contributions are conversion rules between UML and Web services described by Web service description language (WSDL) documents and XML schema.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287330
B. Wang, H. Schulzrinne
Denial-of-Service (DoS) attacks has been threatening our evolving eCommerce and eServices on the Internet for years. Regarding today's stateless Internet environment, researchers have designed various schemes carrying additional information to providing information for defending packet flooding attacks, packet dropping attacks, and routing protocol attacks. We present a multifunctional scheme, the ICMP Caddie message scheme (iCaddie), which loads specialized ICMP messages with route information of randomly-selected IP packets, to support IP traceback, packet dropping detention, routing protocol protection, differential services as well as message authentication and authorization.
{"title":"Multifunctioal ICMP messages for e-commerce","authors":"B. Wang, H. Schulzrinne","doi":"10.1109/EEE.2004.1287330","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287330","url":null,"abstract":"Denial-of-Service (DoS) attacks has been threatening our evolving eCommerce and eServices on the Internet for years. Regarding today's stateless Internet environment, researchers have designed various schemes carrying additional information to providing information for defending packet flooding attacks, packet dropping attacks, and routing protocol attacks. We present a multifunctional scheme, the ICMP Caddie message scheme (iCaddie), which loads specialized ICMP messages with route information of randomly-selected IP packets, to support IP traceback, packet dropping detention, routing protocol protection, differential services as well as message authentication and authorization.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287310
Chiu-Che Tseng
The goal of a decision support system is to provide the human user with an optimized decision recommendation when operating under uncertainty in complex environments. The particular focus of our discussion is the investment domain - the goal of investment decision-making is to select an optimal portfolio that satisfies the investor's objective, or, in other words, to maximize the investment returns under the constraints given by investors. The investment domain contains numerous and diverse information sources, such as expert opinions, news releases and economic figures, and so on. This presents the potential for better decision support, but poses the challenge of building a decision support agent for accessing, filtering, evaluating, incorporating information from different sources, and for making final investment recommendations. We proposed a hybrid recommendation system that utilized two different artificial intelligence techniques to provide human user a decision recommendation on stock portfolio management.
{"title":"Portfolio management using hybrid recommendation system","authors":"Chiu-Che Tseng","doi":"10.1109/EEE.2004.1287310","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287310","url":null,"abstract":"The goal of a decision support system is to provide the human user with an optimized decision recommendation when operating under uncertainty in complex environments. The particular focus of our discussion is the investment domain - the goal of investment decision-making is to select an optimal portfolio that satisfies the investor's objective, or, in other words, to maximize the investment returns under the constraints given by investors. The investment domain contains numerous and diverse information sources, such as expert opinions, news releases and economic figures, and so on. This presents the potential for better decision support, but poses the challenge of building a decision support agent for accessing, filtering, evaluating, incorporating information from different sources, and for making final investment recommendations. We proposed a hybrid recommendation system that utilized two different artificial intelligence techniques to provide human user a decision recommendation on stock portfolio management.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126128856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287358
B. Yen
The performance of information retrieval on the Web is heavily influenced by the organization of Web pages, user navigation patterns, and guidance-related functions. Having observed the lack of measures to reflect this factor, this paper focuses on an approach based on both structure properties and navigation data to analyze and improve the performance of Web site. Two types of indices are defined two major factors for analysis and improvement - "accessibility" reflects the structure property to measure how easy the user can access the pages and "popularity" implies the navigation data primarily based on the log statistics. The accessibility and popularity (A-P) plot serves as a compass for the Web designer to get an overview of current performance status and explore in the possible directions for improvement to balance the design anticipation and navigation expectation.
{"title":"Structure-based analysis of Web sites","authors":"B. Yen","doi":"10.1109/EEE.2004.1287358","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287358","url":null,"abstract":"The performance of information retrieval on the Web is heavily influenced by the organization of Web pages, user navigation patterns, and guidance-related functions. Having observed the lack of measures to reflect this factor, this paper focuses on an approach based on both structure properties and navigation data to analyze and improve the performance of Web site. Two types of indices are defined two major factors for analysis and improvement - \"accessibility\" reflects the structure property to measure how easy the user can access the pages and \"popularity\" implies the navigation data primarily based on the log statistics. The accessibility and popularity (A-P) plot serves as a compass for the Web designer to get an overview of current performance status and explore in the possible directions for improvement to balance the design anticipation and navigation expectation.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287303
Zonghua Zhang, Hong Shen
Although some text processing techniques can be employed to intrusion detection based on the characterization of the frequencies of the system calls executed by the privileged programs, and achieve satisfactory detection accuracy, high false alarms make it hardly practicable in real life. We modify the traditional weighting method tf-idf for suppressing false alarms by considering the necessary information between the processes and sessions. Preliminary experiments with 1998 DARPA BSM auduit data show that our modified method can suppress high false alarms effectively while maintaining satisfactory detection accuracy, which thus make text categorization approaches more practicable for intrusion detection.
{"title":"Suppressing false alarms of intrusion detection using improved text categorization method","authors":"Zonghua Zhang, Hong Shen","doi":"10.1109/EEE.2004.1287303","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287303","url":null,"abstract":"Although some text processing techniques can be employed to intrusion detection based on the characterization of the frequencies of the system calls executed by the privileged programs, and achieve satisfactory detection accuracy, high false alarms make it hardly practicable in real life. We modify the traditional weighting method tf-idf for suppressing false alarms by considering the necessary information between the processes and sessions. Preliminary experiments with 1998 DARPA BSM auduit data show that our modified method can suppress high false alarms effectively while maintaining satisfactory detection accuracy, which thus make text categorization approaches more practicable for intrusion detection.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-03-28DOI: 10.1109/EEE.2004.1287293
Cai-Nicolas Ziegler, G. Lausen
Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contributions to semantic Web trust management are twofold. First, we introduce our classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for semantic Web scenarios. Hereby, we devise our advocacy for local group trust metrics, guiding us to the second part which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion.
{"title":"Spreading activation models for trust propagation","authors":"Cai-Nicolas Ziegler, G. Lausen","doi":"10.1109/EEE.2004.1287293","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287293","url":null,"abstract":"Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subjects, knowing about their credibility becomes equally crucial. Hence, trust and trust metrics, conceived as computational means to evaluate trust relationships between individuals, come into play. Our major contributions to semantic Web trust management are twofold. First, we introduce our classification scheme for trust metrics along various axes and discuss advantages and drawbacks of existing approaches for semantic Web scenarios. Hereby, we devise our advocacy for local group trust metrics, guiding us to the second part which presents Appleseed, our novel proposal for local group trust computation. Compelling in its simplicity, Appleseed borrows many ideas from spreading activation models in psychology and relates their concepts to trust evaluation in an intuitive fashion.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}