By Topic

Mobile Commerce and Services, 2005. WMCS '05. The Second IEEE International Workshop on

Date 19-19 July 2005

Filter Results

Displaying Results 1 - 25 of 29
  • Second IEEE International Workshop on Mobile Commerce and Services - Cover

    Publication Year: 2005 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Second IEEE International Workshop on Mobile Commerce and Services - Title Page

    Publication Year: 2005 , Page(s): i - ii
    Save to Project icon | Request Permissions | PDF file iconPDF (86 KB)  
    Freely Available from IEEE
  • Second IEEE International Workshop on Mobile Commerce and Services - Copyright

    Publication Year: 2005 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Second IEEE International Workshop on Mobile Commerce and Services - Table of contents

    Publication Year: 2005 , Page(s): v - vi
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB)  
    Freely Available from IEEE
  • Message from WMCS’05 Workshop Chairs

    Publication Year: 2005 , Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2005 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • User Expectations for Simple Mobile Ubiquitous Computing Environments

    Publication Year: 2005 , Page(s): 2 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (276 KB) |  | HTML iconHTML  

    In mobile ubiquitous computing environments, users will be able to interact with different devices, providing them with many services. The technological heterogeneity of these environments is expected to increase overall system complexity. Flexibility and adaptability thus become key requirements. The goal of the IST-Simplicity project is to design, develop and evaluate an architectural framework supporting easy customization of terminals, services and networks in a consistent manner. In this paper, we present results from focus groups that have provided valuable user feedback on the concepts, user scenarios and business models developed during the project View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Roadmap to Ambient e-Service

    Publication Year: 2005 , Page(s): 11 - 20
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (421 KB) |  | HTML iconHTML  

    The notion of ambient e-services is defined in this paper to identify a new scope of mobile e-services. The notable features of ambient e-services are the exhilarated linkage based on social context and significantly rapid growth of connections. We present an ambient e-service framework that characterizes ambient e-services with three dimensions (value stack, environment stack and technology stack). Several ambient e-service applications are also exemplified, which rest on the mobile peer-to-peer technology and ambient context aware sensors environments. Ambient e-services make a mobile user not only connect to dynamic ambient environments but also cooperate with other mobile users in the nearby surrounding environment, capitalizing dynamic environmental values as well as dynamic social values. We also present an Ambient e-Service Embracing Model (ASEM) framework that addresses the core elements required for fostering the growth of ambient e-services and steering the directions of future relevant research View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing Mobile Services: Balancing Customer and Network Value

    Publication Year: 2005 , Page(s): 21 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (385 KB) |  | HTML iconHTML  

    Designing mobile services and the business models behind them is a complex undertaking. A business model can be seen as a blueprint of four interrelated components: service offering, technical architecture, and organizational and financial arrangements. How these different components are related to one another, is hardly been object of research. In this paper the connections between these components are explored by analyzing the critical design issues, e.g. targeting, branding and customer retention in the service domain, security, quality of service and system integration in the technology domain, network governance in the organization domain, and revenue sharing in the finance domain. These critical design issues are linked to each other and to expected customer value and expected network value in a conceptual model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Humancentric Applications of RFID Implants: The Usability Contexts of Control, Convenience and Care

    Publication Year: 2005 , Page(s): 32 - 41
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    Recent developments in the area of RFID have seen the technology expand from its role in industrial and animal tagging applications, to being implantable in humans. With a gap in literature identified between current technological development and future humancentric possibility, little has been previously known about the nature of contemporary humancentric applications. This paper utilizes usability context analyses, to provide a cohesive study on the current development state of humancentric applications, detached from the emotion and prediction which plagues this particular technology View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking Wireless LAN Location Systems Wireless LAN Location Systems

    Publication Year: 2005 , Page(s): 42 - 51
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (328 KB) |  | HTML iconHTML  

    Wireless LANs not only provide an affective means of communication, but also allow to extract information about the location of mobile stations. Numerous wireless LAN location systems have been proposed in the past, yet it is difficult to compare the performance of different systems, since the conditions under which these systems are evaluated differ considerably. Hence, the accuracy information presented in literature varies widely, even for conceptually identical systems. This paper proposes to evaluate the performance of location systems in standardised test environments. To this end, existing location systems are discussed to assess their information requirements and their reported accuracies. Subsequently, the requirements for benchmarks in the context of Wireless LAN location systems are established. To conclude, a publicly available benchmark is presented against which different Wireless LAN location systems can be compared View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Sensor System for Mobile Services with Vision Enhanced Object and Location Awareness

    Publication Year: 2005 , Page(s): 52 - 59
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (531 KB) |  | HTML iconHTML  

    We describe a system which proposes a solution for multi-sensor object awareness and positioning to enable stable location awareness for a mobile service in urban areas. The system offers technology of outdoors vision based object recognition that will extend state-of-the-art location and context aware services towards object based awareness in urban environments. In the proposed application scenario, tourist pedestrians are equipped with a GPRS or UMTS capable camera-phone. They are interested whether their field of view contains tourist sights that would point to more detailed information. Multimedia type data about related history might be explored by a mobile user who is intending to learn within the urban environment. Ambient learning is in this way achieved by pointing the device towards the urban sight, capturing an image, and consequently getting information about the object on site and within the focus of attention, i.e., the user's current field of view. The described mobile system offers multiple opportunities for application in both mobile business and commerce, and is currently developed towards an industrial prototype View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral Pattern Analysis of Secure Migration and Communications in eCommerce using Cryptographic Protocols on a Mobile MAS Platform

    Publication Year: 2005 , Page(s): 60 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (417 KB) |  | HTML iconHTML  

    Mobile multi-agent systems (MAS) systems can be used with real success in a growing number of eCommerce applications nowadays. Security has been identified as numerous times by different researchers as a top criterion for the acceptance of mobile agent adoption. In this paper, we present an in-depth analysis of behavior patterns of a mobile MAS platform when using different cryptographic protocols to assure communication and migration integrity and confidentiality. Different use case sceneries of eCommerce applications as well as many other aspects have been studied, such as overhead, different communication patterns, different loads and bandwidth issues. This work is also extensible to other mobile and non-mobile MAS platforms. The results obtained can be used and should be taken into account by designers and implementers of secure mobile and also non-mobile agent platforms and agents View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using The GSM/UMTS SIM to Secure Web Services

    Publication Year: 2005 , Page(s): 70 - 78
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    In this paper we present a mobile operator endorsed authentication and payment platform for the consumption of Web services by a mobile station. We propose a protocol where the mobile operator plays the role of dusted third party to issue authentication and authenticated payment authorisation tokens to facilitate a transaction between a mobile station and a Web service provider. We consider the structure and syntax of these tokens to minimise service latency, and provide security services to protect against the threat model. To validate our proposal we have developed code to create a Web service test scenario utilising readily available J2ME, Java Card, J2SE and J2EE platforms, Wtb Services tools from Apache, the KToolBar emulator from Sun, and a Gem-plus Java Card View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and Modification of ASK Mobile Security Protocol

    Publication Year: 2005 , Page(s): 79 - 83
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    Generally, security protocols have been designed and verified using informal techniques. In the result, it is now well recognized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is secure against replay attack View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Challenges of Location-Aware Mobile Business

    Publication Year: 2005 , Page(s): 84 - 95
    Cited by:  Papers (1)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    In addition to mobility, the ability of context awareness and especially location awareness has greatly enhanced the opportunities of mobile businesses. Many different kinds of context-aware services ranging from "finding nearby restaurants" to "sending ambulances to people in emergency" have already taken their places in the business. Besides availability and quality of the service, the user acceptance and therefore the economic success of mobile business applications fundamentally depend on a robust and easy-to-use security architecture meeting the users' needs for privacy, anonymity, confidential communication and secure payment schemes. Based on a generic framework that is able to execute arbitrary context-aware services, we analyse the security challenges in mobile business with special focus on location as a context property and provide directions towards possible solutions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Efficiency of Decreasing Payment Amounts in Mobile Commerce and Ubiquitous Computing

    Publication Year: 2005 , Page(s): 96 - 101
    Cited by:  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    Personalised, location-related and differentiated services in the mobile digital economy create a demand for suitable pricing models. In the case of disaggregated "microservices" (e.g., small digitalized information or service units), as well as for the acquisition of low-value physical goods, the deployment of micropayments seems appropriate. This paper analyzes the economic efficiency of marginal transaction amounts in M-Commerce by applying the theoretical approach of transaction cost economics. For this purpose, a separation of technical and cognitive transaction costs is applied. The influence of selected determinants such as specifity, uncertainty and bounded rationality on transaction costs in mobile commerce micropayments is analyzed. The theoretical results imply a more likely application of micropayments for physical goods such as beverages or parking tickets than for digital goods and services. In addition, indicators for a significant above-zero lower limit of transaction amounts in mobile commerce are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P-Paid: A Peer-to-Peer Wireless Payment System

    Publication Year: 2005 , Page(s): 102 - 111
    Cited by:  Papers (10)  |  Patents (7)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (412 KB) |  | HTML iconHTML  

    The fast advance of wireless networking, communication, and mobile technology is making a big impact on daily life. The significant increase of mobile device users has caused a strong demand for secured wireless information services and reliable mobile commerce applications. Since wireless payment is a critical part of most wireless information services and mobile commerce applications, generating secured mobile payment systems is becoming a hot research topic in both the e-commerce research community and wireless commerce industry. This paper proposes a peer-to-peer wireless payment system, known as P2P-Paid, to allow two mobile users to conduct wireless payment transactions over Bluetooth communications. The system uses a 2-dimensional secured protocol, which not only supports the peer-to-peer (P2P) payment transactions between two mobile clients using Bluetooth communications, but also supports the related secured transactions between the payment server and mobile clients. This paper provides a system overview about system functional features, system architecture, and technologies used. Moreover, an integrated security solution for the P2P-Paid system is described. Our first phase implementation is reported, and application examples are given to demonstrate the functions and feasibility of this system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the Application of E-Commerce inWireless Network

    Publication Year: 2005 , Page(s): 112 - 122
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (253 KB) |  | HTML iconHTML  

    Owing to the explosive growth of the Internet, various electronic payment systems have been studied and suggested. The security of electronic payment protocols is of particular interest to researchers in academia and industry. However, current electronic cash protocols are not offering adequate security of user information. The BCY protocols (Beller, Chang, and Yacov) are electronic commerce protocols using a certificate in a wireless network. The core of BCY is a set of electronic transactions that reflect common trading activities such as purchasing goods or depositing funds. We use FDR (failure divergence refinements) to verify BCY protocols. Our aim in this paper is to design a practical electronic payment protocol which is secure in wireless circumstances View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • m-Mag: The Mobile Magazine Services Platform

    Publication Year: 2005 , Page(s): 122 - 129
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (467 KB) |  | HTML iconHTML  

    The m-Mag platform advances the state of the art in mobile services by bridging the gap between mobile Operators and content Publishers, enabling the creation of a new category of mobile service called a mobile magazine. An m-Mag mobile magazine is a next generation mobile publishing service that is made available from a mobile operator's portal, that is integrated with value added mobile data services and that uses the operator's billing capabilities to charge consumers for access to the magazine. Using Parlay/OSA as an open approach, the m-Mag platform can integrate into an operator's network using standardised APIs and is portable across different operator networks. A discussion of the commercial potential analyses the route to the market View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalization of End User Software on Mobile Devices

    Publication Year: 2005 , Page(s): 130 - 137
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (242 KB) |  | HTML iconHTML  

    Applications for mobile devices, especially mobile phones, are rarely used today - apart from games. They neither take the special features of each device into account nor the individuality of the user who usually has a much closer emotional relationship to her mobile phone than to many other technical devices. Useful and successful mobile applications can thus be presumably only those that address these deficits. In this paper, we present a novel approach for solving these problems by personalizing Java based mobile applications. The concept centres on a powerful and flexible XML information model that can easily be utilized for adding personalized data and features to an application. The information is weaved into the code by a pre-processor prior to compilation. We also present an example of its usage and discuss some of the consequences View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solution for Hybrid Bandwidth Variation in Wireless Video Environments

    Publication Year: 2005 , Page(s): 138 - 143
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (193 KB) |  | HTML iconHTML  

    With the development of broadband wireless networks, high efficiency of wireless video transmission has been received increasingly greater attentions than before. One should settle the problems of high-compression efficiency and that of adaptation to the random variation of transmission bandwidth, as well as a network friendly design, in wireless environments. SP (Synchronization-Predictive) frame, which enables high efficiency of switching between two or more bitstreams with different qualities, is supported by H.264/AVC extended profile suitable for mobile services. On the other hand, FGS (fine-granular-scalability), which can always adapt to the network bandwidth varying but with some sacrifice of coding efficiency, is supported by MPEG-4. This paper proposes a solution for combination these two tools with each other so as to accommodate high bandwidth variations of wireless networks and low bandwidth variations flexibly for transmitted streams. Moreover, it also improves the efficiency of video streaming. Experimental results show that our proposed system outperforms FGS by 0.76 dB and the H.264/AVC-based video stream switching approach by 0.51 dB on average under 3GPP/3GPP2 wireless common test conditions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A profit maximizing distribution strategy for context-aware services

    Publication Year: 2005 , Page(s): 144 - 153
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (356 KB) |  | HTML iconHTML  

    Large scale mobile commerce applications need to be replicated and distributed to offer an appropriate quality of service to a large audience. In this context, a very important question is when and where replicas should be placed. In this article we present a new distribution strategy for applications in content delivery networks (CDNs). It is intended to be used especially for context-aware services (CAS). The main idea is to monetarily value the benefits that an additional replica gains at a certain location and to compare this value with the costs a replica causes. In this way, the replica's contribution to the overall profit is determined. A replica's profit is dependent on the number of requests it receives per time interval. Replicas are only placed at locations where the request rate is high enough to let the profit become positive. In order to react only to persistent and significant changes of the request rate, techniques from statistical process control are used. The new strategy is evaluated by simulation. The results suggest that it consumes significantly less storage and bandwidth than currently applied alternatives, while offering a comparable performance improvement for the clients View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LOC3 Architecture Proposal for Efficient Subscriber Localisation in Mobile Commerce Infrastructures

    Publication Year: 2005 , Page(s): 154 - 162
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (357 KB) |  | HTML iconHTML  

    The following paper proposes a new approach for providing localisation of mobile subscribers. Since various different localisation technologies have entered the mobile mass-market, mobile applications requiring location information are increasingly challenged by the complexity of selecting and accessing appropriate localisation sources. Addressing this development, an integrative platform is proposed, enabling unified access to the most suitable localisation technology by taking into account accuracy, availability and costs. By assembling state-of-the-art localisation technologies to an implementation called LOC3, the feasibility of the outlined architecture approach is proven View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of A Personal and Intelligent Pervasive-Commerce System Architecture

    Publication Year: 2005 , Page(s): 163 - 173
    Cited by:  Papers (2)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (402 KB) |  | HTML iconHTML  

    This paper studies the paradigm of pervasive commerce (p-commerce) and presents the design of a p-commerce system architecture which consists of e-commerce servers and store sensors. The architecture includes a personal device, PAM (Pervasive Activity Manager), that allows a user to interact with the smart e-commerce environment. PAM can be used to automatically collect sensor information, manage user preference and context, connect to servers and peers on the Web, conduct service checking and integration, and execute user transactions. Extended from traditional m-commerce devices, PAM is user-centric in the sense that it tries to help a user look for preferred products and find the best result for the user. It proactively conducts many context-aware operations in the background without user's explicit requests. We study the p-commerce system issues and define the capabilities to make such a device feasible. We also show shopping scenarios and present a simple PAM prototype using the PDA device available today View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.