The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of e-commerce in small and medium enterprises (SMEs) has become an important topic of many studies. Several studies on e-commerce adoption by SMEs in developing countries have been done. Unfortunately there are still a few studies for that in Indonesia, particularly in West Java province. In addition, only a few studies have been conducted to produce a model that can explain the success of...
This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC. It comprises several Javacard applets supporting several types...
Along with the rapid development of 3rd generation mobile communication technologies, the applications of M-Commerce have been greatly expanded. Based on the research and analysis of the J2ME platform, this paper proposes a secure architecture for M-Commerce systems under the 3G networks. The proposed solution is the combination of J2EE and J2ME capabilities based on the three-tier architecture, as...
This paper discusses two main ideas, Electronic Business Technology and its Security Problems. E-Business relies upon a wide range of technologies. Here we examine the more vital technologies for electronic Business. Included Networks, E-mail, The Word Wide Web etc. On the Internet many electronic Business applications can be used today, but most of them provide only weak security or even none whatsoever...
Based on the concept of E-business, this article analyses the relationship between mobile agent and intelligent e-business, brings forward the e-business concept prototype using agent technology, and an online trade system model is designed via Aglet agent platform according this concept.
With the development and expansion of coal enterprises, enterprise management system is also changing, making the work for bidding in coal enterprises increasingly complex. This paper is to describe the process of bidding system, the function of the bidding system and the database designment of the bidding system probably. The JSP, SQL2000 database storage technology and the popular Struts framework,...
With the increasing development of electronic commerce application, electronic commerce system security is facing the heavy challenge. To arrive at the goal of intensifying the behavior trustworthiness and controllability of electronic commerce systems, we focus on building the trustworthy model between electronic commerce system and user behaviors and strengthening the manageability of electronic...
This paper mainly compares with the implementation technology based on the WAP and J2ME solution. It especially emphasizes the differences among the application architect, the access ability of local saving space, the design of the interface, the technology of security, etc. And the author puts forward some suggestions. The author wishes that it could bring some illumination to the development and...
The Near Field Communication technology is currently leveraged by large standardization efforts and attempts at iquestnding suitable ecosystem and business models. In this context, the GlobalPlatform consortium released requirements to allow multiple actors to manage card content coniquestdentially; and to adapt the platform to the Universal Integrated Circuit Card (UICC) in what is referred to as...
Traditional e-business focuses on physical products trading, and although there are transactions of the so called "virtual products", its scope is limited to "downloadable files" or game card points. But in offline market, services & intellectual works forms an important part in all commercial fields. By reconstructing the concept of "intangible product" in e-business...
The mobile E-commerce identity authentication requires the SMS resources occupied, the numbers of dialogue with servers and the data transmission as few as possible. According to the requirements above, we design an improved identity authentication mechanism - IEIA (Iterative Encryption Identity Authentication) based on Hash Function, and achieve it through J2ME. The mechanism separates the registered...
In this paper, the security of electronic commerce and the security methods are introduced firstly. Then, the history of Java security architecture and its design principles are described. After that, partial implementation of elliptic curve cryptosystem developed with Java is discussed. In the end, the advantages of electronic commerce systems developed with Java language and Java security architecture...
Rapidly development of mobile-payment application is dues to the combination of mobile communication and Internet. The combination of J2ME and J2EE technology provides a good solution for mobile- payment. The characteristics of J2ME and J2EE is researched based on mobile- payment platform, and a whole series of solutions are proposed, these solutions can be applied into mobile commerce system of passenger...
The competition in international commercial activities, especially in retailing and mechanical trades, is increasingly intense. In such a situation, there is not any wiser choice than the Global E-procurement system. However, large numbers of domestic enterprises encounter various problems when dealing with the system. So in this paper, a systematic solution to the E-procurement platform is presented...
SSO (single sign on) provides e-commerce users with easy access to applications and network resources, using a single, secure login identity. Web services (WS) based on SSO provide the potential to achieve interoperability of distributed electronic commerce (e-commerce) application integration among autonomous organizations, regardless of platforms, operating systems or languages. The most important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.