The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Manufacturing enterprises played an important role as the backbone of our economy in economic growth. The web services as an excellent media of e-commerce was infiltrated into manufacturing information. Manufacturing enterprise web services security was a major problem that manufacturing information faced. Web services technology architecture for manufacturing enterprises was introduced. Manufacturing...
Security and domain specific regulations are critical for any organization. Unfortunately, achieving these prerequisites in a socio-technical environment is a difficult task. For example, let us consider the aspect of computer security: neither software developers nor regulatory authorities are security experts. Therefore, it is important that security experts' knowledge is captured and made available...
In view of the limitation of the traditional security technique in Web service (WS) session domain, it researched the session security management model based on Web service and analyzed the security specifications of WS-Security and WS-Conversation proposed by IBM and Microsoft. In combination with a specific E-Commerce project, it discussed the design of session security model, analyzed the process...
Along with the development of e-commerce, the problem of credibility for on-line transaction and exact selection of network resources has become more important. That is because of the anonymity and openness of on-line transactions and the richness of network resources. For this reason, A Trust Domain-Based Resource Selection Model for Multi-Agent (DRSM) is presented. The model divides the network...
When considering Web services' (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especially true with regard to reaching a level of security beyond the technological layer, that is supported and trusted by all businesses involved. With appreciation of this fact, our research draws from established development methodologies...
During the last years, the growth of e-commerce has been considerable due to the increase of user confidence in secure electronic payment. Many web services have been developed and some decided to establish links of confidence, also called circles of trust. A user that accesses a web service in a circle of trust can also access other web services of the circle without additional authentication. In...
Enterprise software is being transformed from an installed product to a hosted service whereby customers pay a subscription fee to access functionality using a Web browser or other clients. The service-oriented architecture (SOA) and Web services will play a key role in driving the vision of software as a service (SaaS). As the number of services and users grow, there is a need for a trusted service...
The following topics are dealt with: future information technology; management engineering; artificial intelligence; machine learning; e-business; e-entrepreneurship; e-learning; e-logistics; security and privacy; Web service; grid service; industry management; information system; information economics; database management; and wireless computing.
This paper is a review of the history of business-to-business exchanges (e-business) from the perspective of standardization. The starting point is EDI (electronic data interchange), which has continued to thrive even as Web applications have increased their popularity. We then discuss the various approaches to assure EDI security on open networks, because they are gradually displacing private networks...
This paper is focused on analyzing business processes integration of third-party logistics service providers (3PLs) in e-commerce. 3PLs are often selected to take charge of the logistics design, delivery, storage, and transportation in a supply chain with their professional and value-added services. This paper establishes a framework of 3PLs business processes, which includes strategic processes,...
This paper presents a novel model to support security in dynamic cooperation of cross-enterprise services. With the extended WSDL description and through the replication technique, the service replica can be dynamically deployed and executed on the optimum cross-enterprise server, which is selected from the registered servers in the enhanced UDDI center according to the server evaluation function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.