The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays electronic commerce (EC) is developing rapidly, and it should integrate with enterprise resource planning (ERP) system which is the subject of enterprise information system organically. ERP is the foundation for enterprise development, only by effectively implementing ERP system, can the space of outward enterprises development be broader, and can enterprise realize true EC. This paper firstly...
Adequate IT support for Business-to-Business integration(B2Bi) is indispensable in today's globalized world. Agreement among personnel from different enterprises as well as distributed computing issues are major challenges to the automation of B2Bi processes. These challenges can be addressed by applying the choreography language ebXMLBPSS (ebBP) for declaratively specifying B2Bi processes and using...
B2B E-Business is becoming one of the most popular electronic business ways. Because of lacking a unified standard and solution of basic architecture and interface, traditional B2B E-Business system has many shortcomings, such as poor reusability and poor extensibility. In order to solve the problems, a B2B E-Business system model based on Web Service is proposed and analyzed. The model can build...
Manufacturing enterprises played an important role as the backbone of our economy in economic growth. The web services as an excellent media of e-commerce was infiltrated into manufacturing information. Manufacturing enterprise web services security was a major problem that manufacturing information faced. Web services technology architecture for manufacturing enterprises was introduced. Manufacturing...
E-Commerce on the Internet makes the business transactions between producers and consumers of commodities easier and thus the cost becomes lower. In the field of e-Commerce, XML is introduced for information exchange, and it is developed for the writing of document structure. This paper tries to use XML for the integration of various e-Commerce information, which include business information, security...
Security has become one of the biggest issues that slow down the progress of e-commerce. Web service is a key technology to achieve e-commerce. On the basis of research of the Web service standards and the features of e-commerce, this paper points out the inadequacies of current electronic commerce system and gives out a security model based on Web service. It can provide two-way authentication, which...
The loosely coupled communication is often needed to exchange commerce data asynchronously between different e-commerce applications. This paper proposed an embedded XML data exchange framework for asynchronous communication between different e-commerce systems. The XML data is used to exchange the e-commerce data between the customers and the special e-commerce system. The XML data is embedded into...
In view of the limitation of the traditional security technique in Web service (WS) session domain, it researched the session security management model based on Web service and analyzed the security specifications of WS-Security and WS-Conversation proposed by IBM and Microsoft. In combination with a specific E-Commerce project, it discussed the design of session security model, analyzed the process...
On the basis of analyzing the requirements to the security of collaborative commerce system based on service oriented architecture, a security solution which can solve the security problem is proposed. The solution includes some technologies such as XML encryption, authority access control, signatures and intrusion detection, etc.
The following topics are dealt with: artificial intelligence; expert systems; human-computer interaction; security and access control; digital libraries; information visualization; P2P; peer to peer data management; information retrieval; information management; mobile, ad hoc and sensor network security; semantic Web; ontology; e-learning; ecommerce; e-business; e-government; Web mining; Web intelligence;...
There are numerous existing notations and standards in the Web service community. These may be grouped broadly into three competing families, namely; Web services, semantic Web, and electronic business. Although the families are competing, we expect that applications will cut across them and there is a need to map from one to another and to analyze compatibility and other properties. Therefore we...
SSO (single sign on) provides e-commerce users with easy access to applications and network resources, using a single, secure login identity. Web services (WS) based on SSO provide the potential to achieve interoperability of distributed electronic commerce (e-commerce) application integration among autonomous organizations, regardless of platforms, operating systems or languages. The most important...
This paper proposes a XML security E-commerce mode, which deals with the security problems of data transmission in E-commerce. Comparing with the traditional methods, the new mode can operate any parts of the data documents according to userspsila desires, and to encrypt and authenticate in arbitrary sequences. For its high flexibility, the new mode is able to satisfy the complex requirements of data...
This paper is a review of the history of business-to-business exchanges (e-business) from the perspective of standardization. The starting point is EDI (electronic data interchange), which has continued to thrive even as Web applications have increased their popularity. We then discuss the various approaches to assure EDI security on open networks, because they are gradually displacing private networks...
This paper is focused on analyzing business processes integration of third-party logistics service providers (3PLs) in e-commerce. 3PLs are often selected to take charge of the logistics design, delivery, storage, and transportation in a supply chain with their professional and value-added services. This paper establishes a framework of 3PLs business processes, which includes strategic processes,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.