By Topic

e-Business Engineering, 2006. ICEBE '06. IEEE International Conference on

Date 24-26 Oct. 2006

Filter Results

Displaying Results 1 - 25 of 110
  • IEEE International Conference on e-Business Engineering - Cover

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (135 KB)  
    Freely Available from IEEE
  • IEEE International Conference on e-Business Engineering - Title

    Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (273 KB)  
    Freely Available from IEEE
  • IEEE International Conference on e-Business Engineering - Copyright

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • IEEE International Conference on e-Business Engineering - Table of contents

    Page(s): v - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (70 KB)  
    Freely Available from IEEE
  • Message from General Chairs

    Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (41 KB)  
    Freely Available from IEEE
  • Message from Program Chairs

    Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • Message from SOAIC Chairs

    Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • ICEBE 2006 and SOAIC Organizers

    Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • ITeS - Transcending the Traditional Service Model

    Page(s): 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (119 KB) |  | HTML iconHTML  

    Summary form only given. The renaissance gave birth to the knowledge revolution, and the industrial revolution introduced mankind to the wonders of technology. The advent of information technology in the 21st century has brought about yet another revolution, the information revolution. The recent onset of IT has brought about technological, economical, social, and cultural changes on an unprecedented scale. Among which, IT enabled e-commerce, revolutionizing the way we go about the traditional exchange of goods, and more importantly, IT infused new life into the service sector, enabling a new breed of service called IT-enabled service (ITeS). Simply put, ITeS is the integration of IT and specific domain knowledge to increase the innovative values of conventional services produced by industries. ITeS can be sub-divided into two categories. The first of which is the integration of IT functionalities into traditional services. Examples include real-time interpretation services made possible with VoIP services and remote healthcare monitoring services provided via the Internet. The second of which is the transformation of IT itself into a service. The textbook example is Google, which provides services ranging from email, search engine, advertisement, news, and media, all based on the premise of the Internet technology itself. Coupling its manufacturing prowess and experience in software development with a dynamic, diversified, and mature IT environment, Taiwan is the perfect test bed for ITeS. However, ITeS is not without its challenges. For instance, language barriers, potential infrastructure compatibilities, and finding Taiwan's niche in the global ITeS value chain are all issues that need to be addressed. The author touches on the rise of ITeS, how ITeS can revolutionize the service sector, the opportunities for Taiwan in this nascent domain, and the challenges it might face while trying to transform from a labor-intensive manufacturing-centric society to one that- 's knowledge-intensive service-centric View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Serving Web 2.0 with SOA: Providing the Technology for Innovation and Specialization

    Page(s): 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (119 KB)  

    Summary form only given. Service-oriented architecture (SOA) using Web services has emerged as a major software architecture. The SOA concept evolves from earlier component-based software frameworks. However, since Web services standards are based on readily and openly available Internet protocols, and thus much cheaper and easier for companies to adopt, major computer and IT companies have quickly embraced SOA. Web 2.0 promotes Web experiences that encourage users to participate in sharing information and enriching services. Users may offer their own contributions as open services to be composed into new components and services. In addition, the combined network effects of pervasive two-way participation are creating a phenomenal communal service architecture on the Web. In order for users and companies to share knowledge and co-produce with peers anywhere, without synchronization, delay, or maintenance, they need to use some powerful underlying set of technologies and paradigms. This is where SOA may provide some help. This talk discuss the service technology challenges and opportunities that are introduced by the dynamism of Web 2.0 services and requirements. The issues may require new concepts, methods, models, and technologies along with flexible and adaptive infrastructures for services composition and management in order to facilitate the two-way integration and formation of services across different sources. The future success of SOA will rely on the development of novel technologies to meet these new demands from the evolving Web 2.0 paradigm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Innovation

    Page(s): 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    Summary form only given. Some have called it the "big blue brain storm" (Business week Aug 8, 2006). Led by its CEO Sam Palmisano, IBM is reaching out to its worldwide workforce, calling on family and friends and business associates and inviting them to participate in a world innovation JAM. IBM has brought together over 104,000 participants in a marathon 76 hour online session in the hopes of linking ideas and technologies that will lead to new business for IBM, help to solve societal problems and maybe revolutionize industry. The technologies that IBM used as its started set were from its worldwide research centers. These included biometric authentication which uses secure identity cards with your biometric information as a way to protect you against identity theft. There's communication pattern analysis with collaborative organizational analysis technology that analyzes communications within a company to both uncover internal patterns and identify potential changes that can be made to improve the organization's efficiency. And the last example is Super Simulations. These are systems like IBM's Blue Gene that are able to handle very sophisticated mathematical models that use real-time streams of real-world data to simulate everything from the weather to biological processes, and allow us to begin making predictions about real-world behaviors. The JAM is the latest in IBM's continuing efforts to create a culture of innovative thinking in its company. But that's only one of the ways IBM thinks about innovation there are others. The Global Innovation Outlook (GIO), has opened up IBM's technical and business forecasting processes to include external leaders from business, academia, the public sector, NGOs and other influential constituents of the world community. The GIO takes a deep look at some of the most pressing issues facing the world and works toward providing solutions to those needs: the future of the enterprise; energy and the environment; and transpor- tation and mobility View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will Existing CS, IT and IS Departments Really Deliver the Service Science, Management and Engineering Vision?

    Page(s): 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (123 KB) |  | HTML iconHTML  

    IBM has been strongly promoting the Service Science, Management & Engineering (SSME) vision, and encouraging the academic community to incorporate SSME content into its existing and new programs. But what will the existing Computer Science, Information Technology and Information Systems departments really do with respect to SSME? This panel brings together leaders from CS, IT, and IS departments from universities in Asia in order to honestly and frankly address the following issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deploying Auctions over Ad Hoc Networks

    Page(s): 9 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    The emergence of new mobile and wireless networks, with novel capabilities, offers opportunities to widen classical Internet-based applications with new ways of use and possibilities. In this paper, we focus on a famous and widely used e-commerce application: auctions, and propose their deployment over ad hoc networks. We prove that such a novel mobile commerce application presents significant advantages with regard to conventional auction models. For the proposed auction model, we have particularly focused on crucial requirements generated by the ad hoc context. Actually, we have identified and then provided security and fairness requirements. Security is provided through threshold cryptography mechanisms, whereas fairness is provided on the basis of rounds duration calculation. Finally, a simulation model of our auctions scheme shows that the theoretical fair round duration can be optimized according to the number of bidders. Performances evaluation presents optimistic results promising a realistic and realizable deployment of this mobile auctions model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation Approach for Analyzing the Competition among e-Auction Marketplaces

    Page(s): 17 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (319 KB) |  | HTML iconHTML  

    In recent years, many e-auction marketplaces have been built and some of them provide similar e-auction services. The sellers and buyers who want to trade via online auctions then have the opportunities to compare and select a marketplace to trade. Therefore, the marketplaces compete with each other to attract participants. This paper proposed a simulation approach for studying such competition between marketplaces. We consider one simple scenario with two competing marketplaces and built the simulation model. This model is implemented within a simulation framework, which is designed and can be applied to many other models generally. Simulation experiments are configured and executed afterwards. The experiment results works not only as a proof of concept, but also confirms theoretical results. The simulation approach proposed in this paper enables a novel way for analyzing the competition among e-auction marketplaces, and such approach can be easily applied for a wide range of competition scenarios between e-auction marketplaces View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Web-based Negotiation Support System in Collaborative Commerce

    Page(s): 25 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (311 KB) |  | HTML iconHTML  

    Support for negotiations is an important issue in today's collaborative commerce (c-commerce) research. Based on the analysis of state of the art of negotiation support system, and aiming at the environment of c-commerce, we present a Web based negotiation support model in this paper. Firstly, we provide a framework for c-commerce. Then, we develop the Web based negotiation support model for c-commerce. A protocol for Web based negotiation has been provided. The protocol is composed of negotiation entity, commerce rules, and agreement, and is formatted in XML schema. Based on the negotiation protocol, the negotiation entities can be used to formulate their commerce rules, resulting in an agreement through the automatic matching of their commerce rules View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Bidding Behavior on eBay Auctions

    Page(s): 33 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    eBay is the most successful online auction site. In this paper, we study bidding behavior on eBay auctions. First, we show that under the assumption of IPV, the truthful and early bidding is approximately optimal. Then, we compare the truthful and early bidding strategy with the late bidding strategy and point out that the optimal bidding strategies rely on the influence of bidders' valuations, i.e., IPV or AV (affiliated valuations). In the following, we analyze the advantages of the truthful and early bidding strategy from different aspects and the influence of auction components on bidding strategies, such as proxy bidding, bid increment, the number of bidders, and stopping rules. Finally, we discuss preliminary their optimal bidding behavior under the assumption of the hybrid valuations of IPV and AV and obtain some conclusions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Untraceable Electronic Cash System Using Fair Blind Signatures

    Page(s): 39 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (158 KB) |  | HTML iconHTML  

    Since the blind signature scheme has the unlinkability property, it can be used for untraceable electronic cash systems. The unlinkability property protects the privacy of users; however, it may be abused by criminals, e.g., to launder money or to safely get a ransom. The techniques of fair blind signature are developed to withstand the misuse of unlinkability property. In this paper, we propose not only a user-efficient but also a signer-efficient fair blind signature scheme for untraceable electronic cash. Only with the help from a judge or government, the signer or the banker can derive the link between a signature and the instance of the signing protocol which produces the signature when the unlinkability property is abused. Comparing with existing fair blind signature schemes, our method greatly reduces the computational load of an on-line judge. Hence, the proposed method with an efficient judge can let the signer provide more efficient services to the signature requesters. It is also suitable for the limited computation capacities of users such as smart cards or mobile units. So, the proposed scheme is very useful for e-commerce transactions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sharing Session Keys in Encrypted Databases

    Page(s): 47 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    Outsourcing database to database service providers demonstrates an emerging computation paradigm in many organizations. To meet the requirement of protecting sensitive data from outside providers, a bucket-based storage method is proposed to store the data encrypted. However, this storage method does not address the access control from the inside users, and an inside user may have enough rights to access the query results. In this paper, we propose a simple method to protect sensitive data both from insiders and outsiders on the bucket-based method. The session keys, used to encrypt sensitive data, are stored encrypted with corresponding tuples on remote databases. By constructing the user abilities to decrypt these encrypted keys on hierarchies, only the users in higher hierarchies are allowed to decrypt the encrypted session keys issued in some lower hierarchies. This method combines key distribution with access control and can be applied in the small enterprises where the users are structured in hierarchies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel algorithm SF for mining attack scenarios model

    Page(s): 55 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    Large volume of security data can overwhelm security managers and keep them from performing effective analysis and initiating timely response. Therefore, it is important to develop an advanced alert correlation system to reduce alert redundancy, intelligently correlate security alerts and detect attack strategies. In our system, we introduced statistical filtering method in attack plan recognition. We apply statistical-based techniques to filter out separated and scattered attack behavior and mining frequent attack sequence patterns from the remainder. We use correlativity between two elements in frequent attack sequences to correlate the attack behavior and identify potential attack intentions based on it. We evaluate our approaches using DARPA 2000 data sets. The experiment shows that our approach can effectively discover attack scenarios in reality, provide a quantitative analysis of attack scenarios View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Analysis of an RFID Security Protocol

    Page(s): 62 - 70
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (945 KB) |  | HTML iconHTML  

    Radio frequency identification (RFID) technology is expected to become a critical and ubiquitous infrastructure technology of logistics and supply chain management (SCM) related processes and services. Low-cost has been the key to RFID adoption in many logistics/SCM applications. However, the deployment of such tags may create new threats to user privacy due to the powerful track and trace capabilities of the tags, in addition to tag/reader manufacturing challenges. As a result, some security mechanisms must be imposed on the RFID tags for addressing the privacy problems. This paper provides detailed discussion on our proposal of a lightweight RFID security protocol. It examines the features and issues through experimental analysis pertinent to efficiency and scalability to meet the requirements of the proposed security protocol in metering and payment e-commerce applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOUNDE: A Hybrid Structure of Service Discovery System for Decentralized E-Commerce

    Page(s): 71 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (649 KB) |  | HTML iconHTML  

    Existing P2P systems are mostly confined to the domain of file sharing systems, which in many aspects differ from decentralized e-commerce, e.g., peer behavior mode and capability diversity. Therefore, we researched on the distinct properties of decentralized e-commerce, especially for B2B level e-commerce, and accordingly, propose a decentralized e-commerce oriented service discovery system, named SOUNDE. The system can be viewed as a two-layer architecture, with the upper layer composed of many e-commerce domains forming a DHT-based topology, then each domain composed of all the related peers in that specific commerce domain, including service requesters and service providers of it, forming an unstructured topology which applies SophiNode service discovery algorithms. Meanwhile, we also put forward GovNode, which plays the role of joint between the two layers. Gathering all the peers within same commerce industry into a logic subnet (commerce domain), then all domains into DHT structure, the fundamental purpose of SOUNDE is to diminish the searching scope of each service query, (i. e. reduce the network load), and allow the system to scale. At the end, we present our simulation and analyze the results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Orchestrating Computing Objects Using Web-Services Technologies - An Intel IT Proof of Concept (POC)

    Page(s): 78 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (538 KB) |  | HTML iconHTML  

    The challenge of ever-growing complexity within the IT enterprise accelerates the evolution of a fully autonomic framework. With the need of an agile IT infrastructure for ever-changing business needs, this evolution is bound to develop based on open standards. We have conducted a proof of concept (POC) using Web services (WS) technologies in an enterprise manageability framework. The proof of concept focuses on a standard messaging layer for enterprise integration, standard and discoverable manageability interfaces, and a holistic object management approach. This paper presents a POC that uses WS standards to build a common "language" between varieties of components within the enterprise. That common "language" includes discoverable interfaces and a local metadata repository. Having this common communications framework with the ability to discover and control computing resources moves us ahead significantly toward the vision of an agile IT infrastructure, and enables the continuous evolution toward the vision of an autonomic enterprise in which holistic, end-to-end object management is possible. WS-Management (WS-Man), which is a messaging protocol dedicated to the purpose of system management, is the primary specification used in the POC. Among other things, this paper presents models to deal with key challenges like dynamic managed-object (MO) discovery and control, federated event processing across domains, and systems which reach beyond technology into business layers. The success of this POC proved that such an end-state vision can be achieved, and is a major step forward toward this goal View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOA-Driven Business-Software Alignment

    Page(s): 86 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    The alignment of business processes and their supporting application software is a major concern during the initial software design phases. This paper proposes a design approach addressing this problem of business-software alignment. The approach takes an initial business model as a basis in deriving refined models that target a service-oriented software implementation. The approach explicitly identifies a software modeling level at which software modules are represented as services in a technology-platform-independent way. This model-driven service-oriented approach has the following properties: (i) there is a forced alignment (consistency) between business processes and supporting applications; (ii) changes in the business environment can be traced to the application and vice versa, via model relationships; (iii) the software modules modeled as services have a high degree of autonomy; (iv) migration to new technology platforms can be supported through the platform independent software model View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service-Oriented Virtual Enterprise Architecture and its Applications in Chinese Tobacco Industrial Sector

    Page(s): 95 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (220 KB) |  | HTML iconHTML  

    This paper introduces the relative concepts of virtual enterprise, and proposes a practical virtual enterprise architecture framework using business, application, and technology layers to realize an adaptive virtual enterprise. It also discusses enterprise business classification, application classification, and the supporting technologies and standards. Based on the proposed framework, after analyzing the requirements of Chinese tobacco industrial contemporary integration manufacturing system (CTI-CIMS) and the key issues occurred in the current practical of tobacco industrial information system construction, an enterprise application integration pattern which is useful for inter-enterprise application integration has been proposed for the development of adaptive enterprise information system in tobacco industry. In a case study, this paper presents a contemporary tobacco distribution system to proof the proposed virtual enterprise architecture framework. At last, some experiences of enterprise information system integration in Chinese tobacco industrial sector are introduced View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust and Risk Evaluation of Transactions with Different Amounts in Peer-to-Peer E-commerce Environments

    Page(s): 102 - 109
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (222 KB) |  | HTML iconHTML  

    As peer-to-peer (P2P) e-commerce environments lack central management, prior to new transactions with an unknown peer, the trust evaluation becomes a very important concern, which relies on the transaction history data. Traditionally the evaluation process is based on other peers' recommendations neglecting transaction amounts. This may lead to the bias to the transaction trust evaluation and risk the new transaction, which may occur between unknown peers. This paper presents a novel model for transaction trust evaluation, which distinguishes transaction amounts and thus computes different impact factors when analyzing old transactions and computing trust values. As a result, the trust evaluation becomes more accurate, which is dependant on transaction history, the amounts of old transactions, the amount of the new transaction, and the temporal dimension. Therefore the obtained trust value can be taken as the risk indication of the forthcoming transaction View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.