The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online intermediation platforms play an increasing role in the economy and carry a growing responsibility for ensuring the global security of society. This article aims to better define algorithmic intermediation by establishing a hierarchy of intermediation actors based on their degree of abstraction from specific services. This hierarchy helps to show that the more platforms offer abstract services,...
The E-business under the pattern of cloud computing has much of advantages and prominent features, which will be confronted with a variety of issues about security just like the current E-business. This article introduces the conception and trait about the E-business under the pattern of cloud computing in brief and puts forward the security threats from the perversion of data security, the criterion...
Network Finance brings great changes and conveniences to enterprise at network economy age, at the same time, but security issues have been the biggest constraint to their development, so how to build the control system of network financial security is an important issue which is urgently in-depth studied. In this paper, the control system of network financial security is constructed systematically...
Recently, the leak of domestic core technology of major business in Korea and the subsequent damage, has been increasing every year. Financial losses due to this leak are estimated to be about 220 trillion, which is equivalent to the gross budget of Korea Besides, the majority of the leaks are caused by former and current staff members, cooperated businesses, scientists and investment companies. This...
In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security-relevant information. This paper scrutinizes this proposed method for security requirements specification and develops a different basic methodology that can be used for the stated purpose...
Web services are composed by consolidation of individual services to constitute complex business processes. Since there are similar functionalities among Web services published by providers, Web services users should consider quality of the services, such as security, when they are composed. This paper aims to design a broker to compose Web services, which considers quality of services in the composition...
Business process modelling is very crucial for enterprises because it give an idea how the business would be operated in the real world and it is important for every stakeholder. Along with increased connectivity in SOA environment, security risks rise exponentially. MDS frameworks are presented to systematically developed security enabled SOA based software applications, where security is modelled...
In a faceless business transaction such as in e-commerce, trust plays a major influence on a customer's decision making behavior. Trust on e-commerce is very much dependent on the information obtained from the vendors' websites. From our own personal experiences with e-commerce websites, it is not unusual to find some essential information missing. In this paper, we present to the readers our findings...
Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing,...
Website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which involves information sharing. However, the awareness about privacy concerns and security threats have caused to non-sharing behavior among the Internet Users. This situation have caused...
Web services enable the collaboration across organizational boundaries and, thus, are a powerful technology for implementing global Service-oriented Architectures, i.e., the Internet of Services. Despite typical security mechanisms such as message encryption, attackers can create detailed profiles of service consumers, providers, and market places by merely monitoring communication endpoints. In a...
In the e-commerce transaction process, varieties of network fraud problems occurred frequently. A C2C service reputation evaluation model under Cloud computing is Proposed. Firstly, the paper analyzes the four factors impact reputation evaluation under the cloud computing environment, and analysis the weights of each factor quantitatively. Secondly, a method to calculate the long-time reputation,...
Resource Date Center (RDC) for labor and social security bureau (LSSB) was come into being following the need of information sharing and social service of networks. Progress on information technology led to unfitness of current theoretical architecture for traditional data center. In this paper, we analyzed the proposed an integrated solution called typical labor and social security management information...
"merge" It is gradual progress of network of next generation and inexorable trend of development, realize the network merge and merge with the business, it is basic prerequisite and basic key element that the data are merged. " unified user's data " As inevitable development trend that network merge, build up about of the next generation network at present, network merge with business...
The online exam system which integrates with Struts2, Spring and Hibernate has been researched here. Based on completion of essential function of online exam system, the thought of S2SH (Struts2+Spring+Hibernate) framework has been adopted in our system which separates view tier, control tier, business logic tier and data accessing tier into different components, as well as utilizes MVC pattern (Model...
Aspect-oriented programming (AOP) is a programming paradigm that increases modularity by enabling improved separation of concerns. Implementing modern Service-Oriented Architecture (SOA) systems requires expertise from people in a variety of roles, including application developers and security experts. Ideally, the application developers should be fully isolated from, and independent of, security...
With the prosperity of E-commerce industry, the electronic commerce course construction also needs developing synchronously. E-commerce security is the important part of e-commerce, and is also a course which combines theory with practice closely. To improve the practical operative ability, a perfect teaching experiment platform is necessary for students to do the e-commerce security-related experiments...
Today large amounts of security and privacy-critical data are transferred, processed and stored in external cloud services. However, with many offerings, you need to be either an ignoramus or a daredevil to surrender such data. For the cautious, trustworthy, sufficient and credible evidence of the actual security, privacy and trust level is a prerequisite for considering cloud services for critical...
As of late, open exposure of telco capabilities has been a target of interest - much due to the success of open application programming interfaces on the Internet services market. Due to the innate ability of the mobile networks to know its users' locations, the location-based services market is an especially interesting area from the operator point of view. Operators could possibly create success...
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one must be able to specify and enforce a variety of constraints such as those derived from legal regulations, Quality of Service (QoS) requirements and privacy and security policies. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.