By Topic

2006 IEEE International Conference on e-Business Engineering (ICEBE'06)

Date 24-26 Oct. 2006

Filter Results

Displaying Results 1 - 25 of 110
  • IEEE International Conference on e-Business Engineering - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • IEEE International Conference on e-Business Engineering - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (273 KB)
    Freely Available from IEEE
  • IEEE International Conference on e-Business Engineering - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • IEEE International Conference on e-Business Engineering - Table of contents

    Publication Year: 2006, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from SOAIC Chairs

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICEBE 2006 and SOAIC Organizers

    Publication Year: 2006, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • ITeS - Transcending the Traditional Service Model

    Publication Year: 2006, Page(s): 2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    Summary form only given. The renaissance gave birth to the knowledge revolution, and the industrial revolution introduced mankind to the wonders of technology. The advent of information technology in the 21st century has brought about yet another revolution, the information revolution. The recent onset of IT has brought about technological, economical, social, and cultural changes on an unpreceden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Serving Web 2.0 with SOA: Providing the Technology for Innovation and Specialization

    Publication Year: 2006, Page(s): 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB)

    Summary form only given. Service-oriented architecture (SOA) using Web services has emerged as a major software architecture. The SOA concept evolves from earlier component-based software frameworks. However, since Web services standards are based on readily and openly available Internet protocols, and thus much cheaper and easier for companies to adopt, major computer and IT companies have quickl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Innovation

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    Summary form only given. Some have called it the "big blue brain storm" (Business week Aug 8, 2006). Led by its CEO Sam Palmisano, IBM is reaching out to its worldwide workforce, calling on family and friends and business associates and inviting them to participate in a world innovation JAM. IBM has brought together over 104,000 participants in a marathon 76 hour online session in the hopes of lin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will Existing CS, IT and IS Departments Really Deliver the Service Science, Management and Engineering Vision?

    Publication Year: 2006, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    IBM has been strongly promoting the Service Science, Management & Engineering (SSME) vision, and encouraging the academic community to incorporate SSME content into its existing and new programs. But what will the existing Computer Science, Information Technology and Information Systems departments really do with respect to SSME? This panel brings together leaders from CS, IT, and IS departments f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deploying Auctions over Ad Hoc Networks

    Publication Year: 2006, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    The emergence of new mobile and wireless networks, with novel capabilities, offers opportunities to widen classical Internet-based applications with new ways of use and possibilities. In this paper, we focus on a famous and widely used e-commerce application: auctions, and propose their deployment over ad hoc networks. We prove that such a novel mobile commerce application presents significant adv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Approach for Analyzing the Competition among e-Auction Marketplaces

    Publication Year: 2006, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In recent years, many e-auction marketplaces have been built and some of them provide similar e-auction services. The sellers and buyers who want to trade via online auctions then have the opportunities to compare and select a marketplace to trade. Therefore, the marketplaces compete with each other to attract participants. This paper proposed a simulation approach for studying such competition be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Web-based Negotiation Support System in Collaborative Commerce

    Publication Year: 2006, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Support for negotiations is an important issue in today's collaborative commerce (c-commerce) research. Based on the analysis of state of the art of negotiation support system, and aiming at the environment of c-commerce, we present a Web based negotiation support model in this paper. Firstly, we provide a framework for c-commerce. Then, we develop the Web based negotiation support model for c-com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Bidding Behavior on eBay Auctions

    Publication Year: 2006, Page(s):33 - 38
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    eBay is the most successful online auction site. In this paper, we study bidding behavior on eBay auctions. First, we show that under the assumption of IPV, the truthful and early bidding is approximately optimal. Then, we compare the truthful and early bidding strategy with the late bidding strategy and point out that the optimal bidding strategies rely on the influence of bidders' valuations, i.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Untraceable Electronic Cash System Using Fair Blind Signatures

    Publication Year: 2006, Page(s):39 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Since the blind signature scheme has the unlinkability property, it can be used for untraceable electronic cash systems. The unlinkability property protects the privacy of users; however, it may be abused by criminals, e.g., to launder money or to safely get a ransom. The techniques of fair blind signature are developed to withstand the misuse of unlinkability property. In this paper, we propose n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing Session Keys in Encrypted Databases

    Publication Year: 2006, Page(s):47 - 54
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    Outsourcing database to database service providers demonstrates an emerging computation paradigm in many organizations. To meet the requirement of protecting sensitive data from outside providers, a bucket-based storage method is proposed to store the data encrypted. However, this storage method does not address the access control from the inside users, and an inside user may have enough rights to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel algorithm SF for mining attack scenarios model

    Publication Year: 2006, Page(s):55 - 61
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Large volume of security data can overwhelm security managers and keep them from performing effective analysis and initiating timely response. Therefore, it is important to develop an advanced alert correlation system to reduce alert redundancy, intelligently correlate security alerts and detect attack strategies. In our system, we introduced statistical filtering method in attack plan recognition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Analysis of an RFID Security Protocol

    Publication Year: 2006, Page(s):62 - 70
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (945 KB) | HTML iconHTML

    Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOUNDE: A Hybrid Structure of Service Discovery System for Decentralized E-Commerce

    Publication Year: 2006, Page(s):71 - 77
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (649 KB) | HTML iconHTML

    Existing P2P systems are mostly confined to the domain of file sharing systems, which in many aspects differ from decentralized e-commerce, e.g., peer behavior mode and capability diversity. Therefore, we researched on the distinct properties of decentralized e-commerce, especially for B2B level e-commerce, and accordingly, propose a decentralized e-commerce oriented service discovery system, name... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Orchestrating Computing Objects Using Web-Services Technologies - An Intel IT Proof of Concept (POC)

    Publication Year: 2006, Page(s):78 - 85
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (538 KB) | HTML iconHTML

    The challenge of ever-growing complexity within the IT enterprise accelerates the evolution of a fully autonomic framework. With the need of an agile IT infrastructure for ever-changing business needs, this evolution is bound to develop based on open standards. We have conducted a proof of concept (POC) using Web services (WS) technologies in an enterprise manageability framework. The proof of con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOA-Driven Business-Software Alignment

    Publication Year: 2006, Page(s):86 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    The alignment of business processes and their supporting application software is a major concern during the initial software design phases. This paper proposes a design approach addressing this problem of business-software alignment. The approach takes an initial business model as a basis in deriving refined models that target a service-oriented software implementation. The approach explicitly ide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service-Oriented Virtual Enterprise Architecture and its Applications in Chinese Tobacco Industrial Sector

    Publication Year: 2006, Page(s):95 - 101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    This paper introduces the relative concepts of virtual enterprise, and proposes a practical virtual enterprise architecture framework using business, application, and technology layers to realize an adaptive virtual enterprise. It also discusses enterprise business classification, application classification, and the supporting technologies and standards. Based on the proposed framework, after anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust and Risk Evaluation of Transactions with Different Amounts in Peer-to-Peer E-commerce Environments

    Publication Year: 2006, Page(s):102 - 109
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    As peer-to-peer (P2P) e-commerce environments lack central management, prior to new transactions with an unknown peer, the trust evaluation becomes a very important concern, which relies on the transaction history data. Traditionally the evaluation process is based on other peers' recommendations neglecting transaction amounts. This may lead to the bias to the transaction trust evaluation and risk... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.