The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the near future, beacon dissemination base stations will be deployed in shopping mall, supermarkets, stadiums, museums, and theatres to send advertisements offering services and products to the customers with mobile devices. Today, an example of this concept of business model is the Apple's iBeacon. Borrowing this concept from mobile computing, we envision a new opportunity for business modeling...
Internet of things (IoT) is a quickly rising paradigm that covers an important set of technologies that are expected to be the next information revolution. IoT is closely connected with people, therefore privacy and security are major issues. In this paper, we summarize current open challenges and present our position on future research directions. We suggest to borrow the "peer approval"...
Near field communication is on the verge of broad adoption worldwide as the NFC controllers and Secure Elements (SEs) are now commonplace components in many models of smart phones and point of sale devices currently available in the market. The combination of NFC and smart devices are making the way of life more easier for millennials. Data aggregation is a common phenomena in any e-commerce method...
E-marketplaces on the worldwide Web are information and transaction silos, which in the general case don't allow transactions across their boundaries. The consequence is that the Web, often termed the global marketplace, is fragmented along the dimensions of geography, content domain, supply or demand, user base, and many more. This fragmentation makes it inefficient to buy and sell commodities on...
During the execution of a business process users need to be authenticated by multiple component service providers, while their identities need to be shared and propagated across multi-domain in a privacy-preserving fashion. An anonymous credential-based identity verification scheme is proposed to address privacy issue. Users establish trust relationship with the federation by running the enrollment...
We consider the question of how to evaluate popularity of digital contents or goods over a distribution service using Oblivious Transfer (OT) protocol. The popularity of served content is the most important marketing data for data mining and analysis, but the idea of oblivious transfer is too privacy-protecting because the service provider cannot obtain any information about a user's queries. In this...
In systems that require several services to collaborate, specifying coordination protocols is vital, but costly. Additionally, several properties, which are derived from laws, regulations, requirements, etc., must be satisfied. Coordination protocol composition approaches construct specific protocols in a cost effective manner in accordance with the composition intentions. However, existing composition...
To reduce mobile users¡¦ dependence on effective network availability, this paper proposes mobile agent technology in mobile computing applications. This allows mobile users to perform data collection and electronic transactions in a wireless network environment. In an agent-based transaction protocol, mobile agents carry information provided by the user and are able to migrate between hosts to execute...
Nowadays, eProcurement, i.e. purchasing goods and services online in a business-to-business or business-to-government transaction, is being seen as a growing opportunity for companies to sell their products. However, today, eProcurement is being carried out by static and inconvenient solutions. Current approaches do not support dynamic federation establishment, automatic payment or a reliable on-the-fly...
With a rapid growth of the Internet, exploring cost-effective and time-efficient methods for creating Internet services has become critical. As an emerging technology, service aggregation has been regarded as a promising candidate. However, it also raises serious issues on privacy management, as a service is usually provided by multiple providers that are usually transparent to its users. We observe...
Certificate-based cryptography and ID-based cryptography have been designed under different theoretical backgrounds and they have their own advantages and drawbacks, but there have been few works which try to provide them together in an efficient way. Chen et al. considered a hybrid scheme of public key infrastructure (PKI) and ID-based encryption (IBE), and also discussed various trust relationship...
The difficulties of e-commerce protocol security are mainly reflected in two aspects: First, the industry has not yet come to a uniform conclusion for the requirements of the security properties of e-commerce, while new properties are continually proposed and updated. The second is the difficulty of the protocol design and verification. This paper makes a new explanation of the protection of individual's...
Privacy in business processes for providing personalized services is currently a matter of trust. Business processes require the disclosure of personal data to third parties and users are not able to control their usage and so their further disclosure. Existing privacy-enhancing technologies consider access control but not usage control of personal data. The current work on usage control mainly considers...
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on secure multi-party computation guarantee privacy and correctness, at an extra communication and computation cost. Efficiency is a major concern for practical solutions. The best known solution with public indexes selection...
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestration of activities exposed as Web services. There are cases in which people must be considered as additional participants to the execution of a process. The inclusion of humans, in turn, requires solutions to support the...
As social networking services are getting more and more common, the need for privacy enhancing options, sophisticated identity management and anonymity emerges. In this paper the authors propose using role-based privacy as a response for these needs and introduce a novel model called nexus-identity network that is capable of describing services extended with such functionality. The concerned principles...
IPTV as an integral part of triple play service offers is regarded as a major differentiation factor by incumbent telecommunication operators. However, as more operators provide these services, differentiation is fading. Analysts agree that the key to differentiation are value added services which in the long term require business collaborations of incumbents and 3rd party Service Providers. Additional...
Privacy in Web services is of great importance and a critical requirement for any business and non-business environments. The growth of Web services has been accompanied by sharing more and more user personal information with Web service providers between diverse and heterogeneous computing systems, which has raised concern about possible malicious or accidental unauthorized abuse of user information...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.