The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Diversified electronic money products are emerging recently with the rapid growth of e-commerce in China. A hot research topic now is to identify the dynamic impact arising from various uncertainties of e-money evolution, which is essential for an effective regulation. This paper gives e-money a formal definition, and puts it into two categories according to legal tender dependency. Detailed discussion...
With the development of Electronic commerce, more and more transactions on information goods or services have been or will be conducted through the Internet, which involve small value payment that called micro-payment. Therefore, micro-payment is one of the most popular research aspects with focus on the field of electronic payment. Many efficient micro-payment schemes were proposed based on PayWord...
Existing techniques based on behavior semantics for informationtheft malware detection have the main shortcomings of low pathcoverage and disability of finding hidden malicious behaviors. Inthis paper we propose a static method for the detection ofinformation theft malware to overcome these shortcomings. It isparticularly efficienct for inter-procedure taint analysis, and itis suitable for complicated...
We proposed a worm detection and defense system named bot-honeynet in this paper, which combines the best features of honeynet, anomaly detection and botnet. The combination of honeynet and anomaly detection system offers a tradeoff between false positive and false negative rates. The control mechanism of botnet can help our system control all the honeypots in the bot-honeynet. Bot-honeynet is designed...
In this paper, taking the survivability of trusted network as the background, the key issues of network survivability are researched. Taking into account the uncertainty, randomness of network services, by introducing cloud model, the status of network service is described in this paper. Based on cloud model, this paper proposes the strategy of status detection for network service, the evaluation...
In this paper, taking subjective trust as the background in the open network system, the subjective trust is analyzed. It shows the subjective trust has the subjectivity, uncertainty and randomness etc., which shows fuzziness. Based on the fuzzy reasoning theory, the subjective trust evaluation model based on fuzzy reasoning is studied and proposed by the aid of local information and the associated...
In recent years, many new logistics organization models (LOMs) emerged at the tactical and operational levels. In order to provide a vehicle for dynamic modeling and analysis of logistics organization operations in vague and uncertain environments, we assess different forms of existing organizations when a store-based sales network coexists with a web site order network. Three main organizational...
First, this paper puts forward the construct of third-party B2B e-marketplaces service orientation from global production networks(GPN) embeddedness of Small and Medium-Sized Enterprises(SMEs) perspective; Second, through the exploratory factor analysis of 56 questionnaire data and confirmatory factor analysis of 148 questionnaire data, the study verifies the multi-dimensional construct and develops...
Business models innovation is vital to sustain competitive advantage during the dramatical change environment. After reviewing the literatures of business models, a value-oriented framework of business models innovation consists of value proposition, value sustain, value supporting and value transforming has been used to analyze the success of Apple iPod and iPhone.
Fair exchange turns out to be an increasingly important topic due to the rapid growth of electronic commerce in daily life. In this paper, a novel model based on game theory is proposed in order to analyze fair exchange protocols. The formal description of fair exchange protocols is given, and two important properties --- non-repudiation and fairness --- are defined in this model. As an illustrating...
The key in P2P network is to locate resources effectively.Chord is a kind of structured P2P network, but the routing table in Chord suffers serious information redundancy and it is not very efficient.Therefore, an improved chord routing algorithm is proposed.On the premise of not increasing the length of routing table, repetitious entries are deleted and anticlockwise routing in the same amount are...
Mutation analysis is a program testing method which seeds a fault in a program and tries to identify it with test data, thus promoting the test efficiency. The paper investigates the application of mutation analysis in model-based testing for the modeling language of finite state machines (FSM). We describe a set of mutation operators for FSM based on the fault category; present an algorithm of selecting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.