Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Manufacturing enterprises played an important role as the backbone of our economy in economic growth. The web services as an excellent media of e-commerce was infiltrated into manufacturing information. Manufacturing enterprise web services security was a major problem that manufacturing information faced. Web services technology architecture for manufacturing enterprises was introduced. Manufacturing...
Security and domain specific regulations are critical for any organization. Unfortunately, achieving these prerequisites in a socio-technical environment is a difficult task. For example, let us consider the aspect of computer security: neither software developers nor regulatory authorities are security experts. Therefore, it is important that security experts' knowledge is captured and made available...
In view of the limitation of the traditional security technique in Web service (WS) session domain, it researched the session security management model based on Web service and analyzed the security specifications of WS-Security and WS-Conversation proposed by IBM and Microsoft. In combination with a specific E-Commerce project, it discussed the design of session security model, analyzed the process...
Along with the development of e-commerce, the problem of credibility for on-line transaction and exact selection of network resources has become more important. That is because of the anonymity and openness of on-line transactions and the richness of network resources. For this reason, A Trust Domain-Based Resource Selection Model for Multi-Agent (DRSM) is presented. The model divides the network...
When considering Web services' (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especially true with regard to reaching a level of security beyond the technological layer, that is supported and trusted by all businesses involved. With appreciation of this fact, our research draws from established development methodologies...
During the last years, the growth of e-commerce has been considerable due to the increase of user confidence in secure electronic payment. Many web services have been developed and some decided to establish links of confidence, also called circles of trust. A user that accesses a web service in a circle of trust can also access other web services of the circle without additional authentication. In...
Enterprise software is being transformed from an installed product to a hosted service whereby customers pay a subscription fee to access functionality using a Web browser or other clients. The service-oriented architecture (SOA) and Web services will play a key role in driving the vision of software as a service (SaaS). As the number of services and users grow, there is a need for a trusted service...
The following topics are dealt with: future information technology; management engineering; artificial intelligence; machine learning; e-business; e-entrepreneurship; e-learning; e-logistics; security and privacy; Web service; grid service; industry management; information system; information economics; database management; and wireless computing.
This paper is a review of the history of business-to-business exchanges (e-business) from the perspective of standardization. The starting point is EDI (electronic data interchange), which has continued to thrive even as Web applications have increased their popularity. We then discuss the various approaches to assure EDI security on open networks, because they are gradually displacing private networks...
This paper is focused on analyzing business processes integration of third-party logistics service providers (3PLs) in e-commerce. 3PLs are often selected to take charge of the logistics design, delivery, storage, and transportation in a supply chain with their professional and value-added services. This paper establishes a framework of 3PLs business processes, which includes strategic processes,...
This paper presents a novel model to support security in dynamic cooperation of cross-enterprise services. With the extended WSDL description and through the replication technique, the service replica can be dynamically deployed and executed on the optimum cross-enterprise server, which is selected from the registered servers in the enhanced UDDI center according to the server evaluation function...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.