The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building an effective trust transaction management mechanism is an important way to prevent fraud behavior in m-commerce. Based on analyzing limitations of the existing online trust transaction mechanism, and according to characteristics of m-commerce transaction trust problem and business coalition in traditional commerce field, the article proposes a new trust transaction management mechanism on...
SMS on demand is a popular form of SMS. This article reports here that the script language designed by ourselves and a novel mobile application which provides GUIs for SMS on demand. Based on the existing mobile applications which provide GUIs to relieve the subscriberspsila burden of memory, the aim of this application is to improve universality of mobile application for SMS on demand. Our application...
In collaborative environment, the negotiation between enterprises is an indispensable step for effective cooperation. In order to support business negotiation in the network environment, this paper proposes a kind of negotiation mechanism based on agent type and equal utility space. The agent type can distinguish different proposal strategy, which makes core enterprise manage the negotiation procedure...
In order to achieve high performance of grid computing, an efficient resource allocation protocol needs to be carefully chosen and applied. Using auction mechanism design theory, this paper designs a novel double auction mechanism which is appropriate for allocation of multi-unit homogenous and divisible resources in the grid. In the grid, there are multiple resource consumers and resource providers...
To meet the needs of technology innovation for current e-commerce system development, an integration platform for e-commerce system development is studied and designed, into which Spring framework is appropriately combined. A system prototype which is loose-coupled, easily extendable and maintainable is realized. Finally, the platform is applied in an on-line bookstore system.
This work proposes an on-the-fly testing approach for Web applications based on automaton theory. Web applications and test directives which are used to select test cases are modeled by FSM (Finite State Machine). Synchronous product is used to combine these two kinds of FSMs in order to check whether the SUT (System Under Test) includes the behavior expressed by the test directive. Test cases are...
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remote server. However, some weaknesses of the two bilinear pairing based remote password authentication schemes are found in the paper. The schemes suffer from offline password guessing attack...
Authenticated key agreement protocol is the fundamental building block for secure communication in the open network to ensure authentication and confidentiality of e-commerce and e-government applications. Certificateless public key cryptography combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we present a secure and efficient two-party...
Considering on judicial forensic requirements and the character of network crime diversity, a architecture based on XML and plug-in techniques is proposed in this paper. The framework adopts encrypt and authentication technology which ensures collected evidence can be accepted by court, so the original evidence in framework is stability. Because of the network applicationpsilas diversity, the judgment...
E-Commerce systems are suffering more and more security issues. Vulnerabilities of authentication systems are revealed when various attacks and malicious abuses are developed and deployed to violate security of system and information. To improve the ability to defend authentication system against invasion and abuse, a novel penetration testing method for E-Commerce authentication system is proposed...
In order to provide a transaction environment of more security for e-commerce system, a novel intrusion detection system (IDS) based on the system call sequences is proposed in this paper. Firstly, this system improves the basic short sequence matching model combined with consistency principle of process initialization to emphasize on detecting system call sequences when process is initializing. Secondly,...
The fingerprint quality is considered as a good predictor for fingerprint recognition performance and knowing the fingerprint quality in advance is useful to improve the fingerprint recognition performance. The existing fingerprint quality estimation systems are all designed for minutiae-based fingerprint recognition system. But with the obvious advantage and widespread of ROI-based fingerprint recognition...
Accountability and fairness are two important requirements of secure e-payment protocols, which can provide evidences to solving disputes in e-commerce and keep sure that each participant in protocol achieves fairness in an unreliable channel. Therefore logic formal analysis in these two aspects has become very important. In this paper, we have formally analyzed iKP protocol by extended Kailar logic...
Once the computer system is intruded, the change from normal to abnormal is a gradual procedure. Setting up a calculating model based on danger theory for danger signal during the procedure will improve the accuracy and efficiency of artificial immune system (AIS) greatly. In this paper, the method of classified danger sensed (MCDS) for windows process intrusion detection based on danger theory is...
Malware has become the centerpiece of security threats on the e-commercial business. The focus of malware research is shifting from using signature patterns to identifying the malicious behavior patterns. Many researcher extract behavior pattern from system call sequences to identify malware from benign programs with data mining techniques. Most system call tracing tools must run alongside the malware...
Security is one of key problems in RFID application. This research is to find a security algorithm for RFID with very low computing requirement. Minimalist cryptography only needs exclusive Or (XOR) and simple logical control, and it can protect privacy and provide mutual authentication. However, the algorithm has hidden security problems while assuming that the attacker couldnpsilat monitor the data...
Trust-X is an influencing trust management model. To implement the idea of trust negotiation based on trust-X properly, the negotiation process and key negotiation algorithms of the trust-X and its application to the example of online car rental are investigated. Some errors of the model at the key negotiation algorithms are found. In fixing them, some modification to the algorithms for the negotiation-tree-building...
This paper reports the findings of a study of attitudes towards data security issues and awareness of the potential risks of social networking sites, most notably the possibility of identity fraud. The population for this study is people in the 18-24 age group living in Ireland, for which the students of one of the country's main universities were used as a proxy sample. The main findings is that...
A watermarking-based host correlation detection method is proposed in this paper. The idea is to embed some unique watermark into the flow by slightly adjusting the timing of selected packets in the flow. In the embedding phase, we use network flow grouping strategy to divide the IPDs (i.e., interpacket delay) into two different groups randomly, and then realize the watermark embedding by utilizing...
Semi-fragile watermark has attracted attention due to its important role in content authentication for multimedia. In order to distinguish malicious tampering from incidental attacks, semi-fragile watermark must be robust against content-protection image processing. Due to the widely use of JPEG compression, it is always an important subject of semi-fragile watermarking research to improve the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.