首页 > 最新文献

IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004最新文献

英文 中文
Utilising push and pull mechanism in wireless e-health environment 在无线电子医疗环境中利用推拉机制
A. Waluyo, R. Hsieh, D. Taniar, W. Rahayu, B. Srinivasan
The emerging of wireless computing motivates radical changes of how information is derived. Our paper concerns with developing push and pull based application in wireless environment. We use a simplified e-health (hospital) context to demonstrate some effective uses of pull-based and push-based mechanisms. The pull mechanism involves information retrieval from a database, and update information in the database. The push mechanism is classified into three scenarios, (i) aperiodic push, (ii) periodic push - global recipients and (iii) periodic push - selective recipients.
无线计算的出现促使信息的获取方式发生了根本性的变化。本文主要研究无线环境下基于推拉的应用程序开发。我们使用简化的电子卫生(医院)环境来演示基于拉动和基于推动机制的一些有效使用。pull机制包括从数据库中检索信息,并更新数据库中的信息。推送机制分为三种情况,(i)非周期性推送,(ii)周期性推送—全局接收方和(iii)周期性推送—选择性接收方。
{"title":"Utilising push and pull mechanism in wireless e-health environment","authors":"A. Waluyo, R. Hsieh, D. Taniar, W. Rahayu, B. Srinivasan","doi":"10.1109/EEE.2004.1287322","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287322","url":null,"abstract":"The emerging of wireless computing motivates radical changes of how information is derived. Our paper concerns with developing push and pull based application in wireless environment. We use a simplified e-health (hospital) context to demonstrate some effective uses of pull-based and push-based mechanisms. The pull mechanism involves information retrieval from a database, and update information in the database. The push mechanism is classified into three scenarios, (i) aperiodic push, (ii) periodic push - global recipients and (iii) periodic push - selective recipients.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132308460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Matchmaking for business processes based on choreographies 基于编排的业务流程匹配
A. Wombacher, Péter Fankhauser, Bendick Mahleko, E. Neuhold
Web services have a potential to enhance B2B e-commerce over the Internet by allowing companies and organizations to publish their business processes on service directories where potential trading partners can find them. This can give rise to new business paradigms based on ad-hoc trading relations as companies, particularly small to medium scale, can cheaply and flexibly enter into fruitful contracts, e.g., through subcontracting from big companies by simply publishing their business processes and the services they offer. More business process support by the Web service infrastructure is however needed before such a paradigm change can materialize. A service for searching and matchmaking of business processes does not yet exist in the current infrastructure. We believe that such a service is needed and will enable companies and organizations to be able to establish ad-hoc business relations without relying on manually negotiated interorganizational workflows. We give a formal semantics to business process matchmaking based on finite state automata extended by logical expressions associated to states.
通过允许公司和组织在潜在的贸易伙伴可以找到的服务目录上发布其业务流程,Web服务具有增强Internet上B2B电子商务的潜力。这可以产生基于特殊贸易关系的新业务范例,因为公司,特别是中小型公司,可以廉价和灵活地签订富有成效的合同,例如,通过简单地公布其业务流程和提供的服务,从大公司进行分包。然而,在实现这种范式变更之前,需要Web服务基础设施提供更多的业务流程支持。在当前的基础设施中还不存在用于搜索和匹配业务流程的服务。我们相信这样的服务是需要的,它将使公司和组织能够建立特别的业务关系,而不依赖于人工协商的组织间工作流。在有限状态自动机的基础上,通过与状态相关的逻辑表达式进行扩展,给出了业务流程匹配的形式化语义。
{"title":"Matchmaking for business processes based on choreographies","authors":"A. Wombacher, Péter Fankhauser, Bendick Mahleko, E. Neuhold","doi":"10.1109/EEE.2004.1287334","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287334","url":null,"abstract":"Web services have a potential to enhance B2B e-commerce over the Internet by allowing companies and organizations to publish their business processes on service directories where potential trading partners can find them. This can give rise to new business paradigms based on ad-hoc trading relations as companies, particularly small to medium scale, can cheaply and flexibly enter into fruitful contracts, e.g., through subcontracting from big companies by simply publishing their business processes and the services they offer. More business process support by the Web service infrastructure is however needed before such a paradigm change can materialize. A service for searching and matchmaking of business processes does not yet exist in the current infrastructure. We believe that such a service is needed and will enable companies and organizations to be able to establish ad-hoc business relations without relying on manually negotiated interorganizational workflows. We give a formal semantics to business process matchmaking based on finite state automata extended by logical expressions associated to states.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130608114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 174
A self-adapting mobile IPv6 model based on MAP 基于MAP的自适应移动IPv6模型
Tianhan Gao, Nan Guo, Hong Zhao
A self-adapting mobile IPv6 model based on MAP is presented to optimize the performance when mobile node moves frequently at remote region. Through enhancing the MAP, adopting the self-adapting binding update policy and intra-CN process, the model optimizes mobile node's moving performance, owns the capability of self-adapting to exterior network changes as well as improves the utilization of network resources.
为了优化移动节点在偏远地区频繁移动时的性能,提出了一种基于MAP的自适应移动IPv6模型。该模型通过增强MAP,采用自适应绑定更新策略和cn内进程,优化了移动节点的移动性能,具有自适应外部网络变化的能力,提高了网络资源的利用率。
{"title":"A self-adapting mobile IPv6 model based on MAP","authors":"Tianhan Gao, Nan Guo, Hong Zhao","doi":"10.1109/EEE.2004.1287349","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287349","url":null,"abstract":"A self-adapting mobile IPv6 model based on MAP is presented to optimize the performance when mobile node moves frequently at remote region. Through enhancing the MAP, adopting the self-adapting binding update policy and intra-CN process, the model optimizes mobile node's moving performance, owns the capability of self-adapting to exterior network changes as well as improves the utilization of network resources.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132603348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of detailed electronic time-stamping using digital TV 利用数字电视进行详细的电子时间戳分析
T. Morigaki, Kanta Matsuura, O. Sudo
Theoretical studies on electronic time stamping and audit logs protection have focused mainly on safety, particularly, "the identification of falsified contents or sequences through encryption". However, these studies don't consider such details as time (being punctual to the second) or which electronic documents or data are older or newer when looking at several different sites. We solve the problem of time accuracy by using digital TV as a base for judging the order relation of time information between two or more sites. We design a new electronic time-stamping protocol for digital TV and invented a new digital publication infrastructure. This protocol can also accommodate the demand for ultra high-speed electronic commerce transactions in the future. Therefore, it is possibly become one of the important e-business models or enterprise e-service architectures. We show these procedures and compare them to procedures shown in other papers.
关于电子时间戳和审计日志保护的理论研究主要集中在安全方面,特别是“通过加密识别伪造的内容或序列”。然而,这些研究并没有考虑到时间(准时到秒)等细节,或者在查看几个不同的网站时,哪些电子文件或数据是旧的或新的。利用数字电视作为判断两个或多个站点间时间信息顺序关系的依据,解决了时间精度问题。我们为数字电视设计了一种新的电子时间戳协议,并发明了一种新的数字出版基础设施。该协议还可以适应未来超高速电子商务交易的需求。因此,它有可能成为重要的电子商务模式或企业电子服务体系结构之一。我们展示了这些程序,并将它们与其他论文中的程序进行了比较。
{"title":"An analysis of detailed electronic time-stamping using digital TV","authors":"T. Morigaki, Kanta Matsuura, O. Sudo","doi":"10.1109/EEE.2004.1287323","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287323","url":null,"abstract":"Theoretical studies on electronic time stamping and audit logs protection have focused mainly on safety, particularly, \"the identification of falsified contents or sequences through encryption\". However, these studies don't consider such details as time (being punctual to the second) or which electronic documents or data are older or newer when looking at several different sites. We solve the problem of time accuracy by using digital TV as a base for judging the order relation of time information between two or more sites. We design a new electronic time-stamping protocol for digital TV and invented a new digital publication infrastructure. This protocol can also accommodate the demand for ultra high-speed electronic commerce transactions in the future. Therefore, it is possibly become one of the important e-business models or enterprise e-service architectures. We show these procedures and compare them to procedures shown in other papers.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new fair micropayment system based on hash chain 基于哈希链的新型公平小额支付系统
Yong Zongkai, Lan Weimin, Tan Yunmeng
Micropayment systems in existence usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misbehaving in the protocols. We propose a new fair micropayment system based on hash chain, which is an offline, prepaid system and supports divisibility of digital coins in a simpler way. Moreover, in our system, a hash chain can be used to have transactions with different merchants. Compared with other micropayment schemes, e.g. Pay Word, no public-key operation is required, which improves the efficiency of our system. In addition, restricted anonymous is provided in our system.
现有的微支付系统通常不提供公平,这意味着消费者或商家,或两者都可以欺骗对方,并通过在协议中的不当行为获得经济优势。我们提出了一种新的基于哈希链的公平小额支付系统,它是一种离线预付费系统,以更简单的方式支持数字货币的可整除性。此外,在我们的系统中,哈希链可以用来与不同的商家进行交易。与Pay Word等其他小额支付方案相比,不需要进行公钥操作,提高了系统的效率。此外,我们的系统提供了受限制的匿名功能。
{"title":"A new fair micropayment system based on hash chain","authors":"Yong Zongkai, Lan Weimin, Tan Yunmeng","doi":"10.1109/EEE.2004.1287300","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287300","url":null,"abstract":"Micropayment systems in existence usually do not provide fairness, which means that either the customer or the merchant, or both, can cheat each other and gain a financial advantage by misbehaving in the protocols. We propose a new fair micropayment system based on hash chain, which is an offline, prepaid system and supports divisibility of digital coins in a simpler way. Moreover, in our system, a hash chain can be used to have transactions with different merchants. Compared with other micropayment schemes, e.g. Pay Word, no public-key operation is required, which improves the efficiency of our system. In addition, restricted anonymous is provided in our system.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Single-pass algorithms for mining frequency change patterns with limited space in evolving append-only and dynamic transaction data streams 在不断发展的仅追加和动态事务数据流中挖掘有限空间的频率变化模式的单遍算法
Hua-Fu Li, Suh-Yin Lee
We propose an online single-pass algorithm MFC-append (mining frequency change patterns in append-only data streams) for online mining frequent frequency change items in continuous append-only data streams. An online space-efficient data structure called Change-Sketch is developed for providing fast response time to compute dynamic frequency changes between data streams. A modified approach MFC-dynamic (mining frequency change patterns in dynamic data streams) is also presented to mine frequency changes in dynamic data streams. The theoretic analyses show that our algorithms meet the major performance requirements of single-pass, bounded storage, and real time for streaming data mining.
我们提出了一种在线单遍算法MFC-append(挖掘仅追加数据流中的频率变化模式),用于在线挖掘连续仅追加数据流中的频繁频率变化项。为了提供快速的响应时间来计算数据流之间的动态频率变化,开发了一种称为Change-Sketch的在线空间高效数据结构。提出了一种改进的MFC-dynamic(挖掘动态数据流中的频率变化模式)方法来挖掘动态数据流中的频率变化。理论分析表明,我们的算法满足了流数据挖掘的单遍、有界存储和实时性的主要性能要求。
{"title":"Single-pass algorithms for mining frequency change patterns with limited space in evolving append-only and dynamic transaction data streams","authors":"Hua-Fu Li, Suh-Yin Lee","doi":"10.1109/EEE.2004.1287312","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287312","url":null,"abstract":"We propose an online single-pass algorithm MFC-append (mining frequency change patterns in append-only data streams) for online mining frequent frequency change items in continuous append-only data streams. An online space-efficient data structure called Change-Sketch is developed for providing fast response time to compute dynamic frequency changes between data streams. A modified approach MFC-dynamic (mining frequency change patterns in dynamic data streams) is also presented to mine frequency changes in dynamic data streams. The theoretic analyses show that our algorithms meet the major performance requirements of single-pass, bounded storage, and real time for streaming data mining.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129489682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol Aydos等人基于ecc无线认证协议的密码分析
Hung-Min Sun, Bin-Tsan Hsieh, V. Tseng
With the rapid development of communication technology, wireless technology has become more and more important, and has been widely used in personal communication. Recently, Aydos et al. proposed an ECC-based authenticated key agreement protocol for wireless communication. In their protocol, they used ECDSA and Diffie-Hellman key agreement to provide authentication and to obtain a session key for later communication. In this paper, however, we show that Aydos et al's ECC-based authenticated key agreement protocol for wireless communication does not achieve some essential security requirements including forward secrecy, known-key security, and mutual authentication.
随着通信技术的飞速发展,无线技术变得越来越重要,并在个人通信中得到了广泛的应用。最近,Aydos等人提出了一种基于ecc的无线通信认证密钥协议。在他们的协议中,他们使用ECDSA和Diffie-Hellman密钥协议来提供身份验证,并为以后的通信获取会话密钥。然而,在本文中,我们证明了Aydos等人基于ecc的无线通信认证密钥协议没有达到一些基本的安全要求,包括前向保密、已知密钥安全性和相互认证。
{"title":"Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol","authors":"Hung-Min Sun, Bin-Tsan Hsieh, V. Tseng","doi":"10.1109/EEE.2004.1287366","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287366","url":null,"abstract":"With the rapid development of communication technology, wireless technology has become more and more important, and has been widely used in personal communication. Recently, Aydos et al. proposed an ECC-based authenticated key agreement protocol for wireless communication. In their protocol, they used ECDSA and Diffie-Hellman key agreement to provide authentication and to obtain a session key for later communication. In this paper, however, we show that Aydos et al's ECC-based authenticated key agreement protocol for wireless communication does not achieve some essential security requirements including forward secrecy, known-key security, and mutual authentication.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A redundant nested invocation suppression mechanism for active replication fault-tolerant Web service 用于活动复制容错Web服务的冗余嵌套调用抑制机制
Chen-Liang Fang, Deron Liang, Chyouhwa Chen, PuSan Lin
Zwass suggested that middleware and message service is one of the five fundamental technologies used to realize electronic commerce (EC) [Zwass, V. (1996)]. The simple object access protocol (SOAP) is recognized as a more promising middleware for EC applications among other leading candidates such as CORBA. We notice that the fault-tolerance issue is somewhat neglected in the current standard, i.e., SOAP 1.1. We therefore proposed a fault tolerant Web service called fault-tolerant SOAP or FT-SOAP through which Web services can be built with higher resilience to failure. Active replication is a common approach to building highly available and reliable distributed software applications. The redundant nested invocation (RNI) problem arises when servers in a replicated group issues nested invocations to other server groups in response to a client invocation. In this work, we propose a mechanism to perform auto-suppression of redundant nested invocation in an active replication FT-SOAP system. Our approach ensures the portability requirement of a middleware, especially for FT-SOAP.
Zwass建议中间件和消息服务是实现电子商务(EC)的五种基本技术之一[Zwass, V.(1996)]。简单对象访问协议(SOAP)被认为是在CORBA等其他主要候选中间件中更有前途的EC应用程序中间件。我们注意到,在当前的标准(即SOAP 1.1)中,容错问题在某种程度上被忽略了。因此,我们提出了一种容错Web服务,称为容错SOAP或FT-SOAP,通过它可以构建具有更高故障恢复能力的Web服务。主动复制是构建高可用性和可靠的分布式软件应用程序的常用方法。当复制组中的服务器响应客户机调用向其他服务器组发出嵌套调用时,就会出现冗余嵌套调用(RNI)问题。在这项工作中,我们提出了一种在主动复制FT-SOAP系统中执行冗余嵌套调用自动抑制的机制。我们的方法确保了中间件的可移植性需求,特别是对于FT-SOAP。
{"title":"A redundant nested invocation suppression mechanism for active replication fault-tolerant Web service","authors":"Chen-Liang Fang, Deron Liang, Chyouhwa Chen, PuSan Lin","doi":"10.1109/EEE.2004.1287282","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287282","url":null,"abstract":"Zwass suggested that middleware and message service is one of the five fundamental technologies used to realize electronic commerce (EC) [Zwass, V. (1996)]. The simple object access protocol (SOAP) is recognized as a more promising middleware for EC applications among other leading candidates such as CORBA. We notice that the fault-tolerance issue is somewhat neglected in the current standard, i.e., SOAP 1.1. We therefore proposed a fault tolerant Web service called fault-tolerant SOAP or FT-SOAP through which Web services can be built with higher resilience to failure. Active replication is a common approach to building highly available and reliable distributed software applications. The redundant nested invocation (RNI) problem arises when servers in a replicated group issues nested invocations to other server groups in response to a client invocation. In this work, we propose a mechanism to perform auto-suppression of redundant nested invocation in an active replication FT-SOAP system. Our approach ensures the portability requirement of a middleware, especially for FT-SOAP.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128560284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secure online examination architecture based on distributed firewall 基于分布式防火墙的安全在线考试体系结构
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other, and we can't prevent the cheating. Therefore, keeping the security of a online examination has become an important issue. This paper focuses on how to implement a secure environment for online-examination in the general academic network environment without the need of special network topologies and hardware devices. It not only reduces the system administrator's load, but also enhances the system flexibility to fit every teacher's needs. We use (1) the distributed firewall techniques to control the network packets of all machines, and (2) the centralized security policy management to control the security policies for all machines. Beside the above mentioned, we also design some mechanisms to prevent the possible network attacks and cheating, which enhance the security of the online examination environment.
网络考试是大众教育评价的有效解决方案。然而,由于网络安全的不完善,学生之间可以互相交流,我们无法防止作弊。因此,保证在线考试的安全性就成为一个重要的问题。本文主要研究如何在一般的学术网络环境下,在不需要特殊的网络拓扑结构和硬件设备的情况下,实现一个安全的在线考试环境。它不仅减轻了系统管理员的负担,而且提高了系统的灵活性以适应每位教师的需求。我们使用(1)分布式防火墙技术来控制所有机器的网络数据包,(2)集中式安全策略管理来控制所有机器的安全策略。除此之外,我们还设计了一些机制来防止可能的网络攻击和作弊,从而提高了在线考试环境的安全性。
{"title":"Secure online examination architecture based on distributed firewall","authors":"Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee","doi":"10.1109/EEE.2004.1287359","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287359","url":null,"abstract":"Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other, and we can't prevent the cheating. Therefore, keeping the security of a online examination has become an important issue. This paper focuses on how to implement a secure environment for online-examination in the general academic network environment without the need of special network topologies and hardware devices. It not only reduces the system administrator's load, but also enhances the system flexibility to fit every teacher's needs. We use (1) the distributed firewall techniques to control the network packets of all machines, and (2) the centralized security policy management to control the security policies for all machines. Beside the above mentioned, we also design some mechanisms to prevent the possible network attacks and cheating, which enhance the security of the online examination environment.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125254284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Knowledge oriented negotiation for agent-based B2B electronic commerce 基于代理的B2B电子商务中面向知识的谈判
Zhuang Yan, S. Fong, Meilin Shi
The objective is to design an agent-based B2B trading system that has both the dynamic negotiation ability and knowledge management functionality. Achieving both agent negotiation and knowledge management (KM) is believed to be possible when the "knowledge" that is used to describe the product and the deal are commonly represented by an object-oriented ontology called Knowledge Bead (KB) [S. Fong, et al. (2002)]. We focus on the knowledge context of agent negotiation process in electronic marketplace, discuss how knowledge can be formulated and managed, and further be utilized to assist in the competent negotiation process. This is the continued research work on knowledge beads [S. Fong, et al. (2002)][Z. Yan, et al. (2003)]. The anticipated contribution will be a clearer understanding on knowledge management utilization for intelligent negotiation in electronic commerce.
目标是设计一个既具有动态谈判能力又具有知识管理功能的基于agent的B2B交易系统。当用于描述产品和交易的“知识”通常由称为知识头(knowledge Bead, KB) [S]的面向对象本体表示时,实现代理协商和知识管理(knowledge management, KM)是可能的。方,等(2002)。本文着重分析了电子市场中代理谈判过程的知识背景,讨论了如何制定和管理知识,并进一步利用知识来协助有效的谈判过程。这是对知识珠的持续研究工作[S]。方,等。(2002)[j]。阎,等(2003)。期望对电子商务中知识管理在智能谈判中的应用有更清晰的认识。
{"title":"Knowledge oriented negotiation for agent-based B2B electronic commerce","authors":"Zhuang Yan, S. Fong, Meilin Shi","doi":"10.1109/EEE.2004.1287341","DOIUrl":"https://doi.org/10.1109/EEE.2004.1287341","url":null,"abstract":"The objective is to design an agent-based B2B trading system that has both the dynamic negotiation ability and knowledge management functionality. Achieving both agent negotiation and knowledge management (KM) is believed to be possible when the \"knowledge\" that is used to describe the product and the deal are commonly represented by an object-oriented ontology called Knowledge Bead (KB) [S. Fong, et al. (2002)]. We focus on the knowledge context of agent negotiation process in electronic marketplace, discuss how knowledge can be formulated and managed, and further be utilized to assist in the competent negotiation process. This is the continued research work on knowledge beads [S. Fong, et al. (2002)][Z. Yan, et al. (2003)]. The anticipated contribution will be a clearer understanding on knowledge management utilization for intelligent negotiation in electronic commerce.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1