By Topic

2009 International Conference on E-Business and Information System Security

Date 23-24 May 2009

Filter Results

Displaying Results 1 - 25 of 294
  • EBISS09 - Title page

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • EBISS09 [Copyright notice]

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • EBISS09 Sponsors

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • EBISS09 Message from the Chair

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • EBISS09 Organizing Committee

    Publication Year: 2009, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • EBISS09 Program Committee

    Publication Year: 2009, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • EBISS09 List of Papers

    Publication Year: 2009, Page(s):vii - xxii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • EBISS09 author listing

    Publication Year: 2009, Page(s):xxiii - xxvi
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • A Binary Ant Algorithm for Partner Selection Problem in the Virtual Enterprise

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    The formation of a Virtual Enterprise and the selection of its partners is an important process in the lifecycle of a Virtual Enterprise. This paper employs a binary coded ant colony optimization (ACO) algorithm for the partner selection optimization. At first, an optimization model is presented, which includes the main crucial factors for partner selection, such as running cost, reaction time and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Chaos-Based Key Predistribution and Management Scheme in Wireless Sensor Network

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    To increase the security of wireless sensor network, reduce the cost of energies and prolong the lifecycle of the system, a chaos scheme of key predistribution and management was put forward. In this scheme, the chaos over-spread character was used to enlarge the key space and increase the anti-decipher capacity. The chaos initial value sensitivity was used to spend smaller costs while greatly enh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparative Study of Mobile Electronic Commerce Based on the WAP and J2ME Implementation Technology

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    This paper mainly compares with the implementation technology based on the WAP and J2ME solution. It especially emphasizes the differences among the application architect, the access ability of local saving space, the design of the interface, the technology of security, etc. And the author puts forward some suggestions. The author wishes that it could bring some illumination to the development and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison Study on Interest Rate Models of SHIBOR Based on MCMC Method

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    The main goal of this paper is to investigate the presence of jumps in Shanghai Inter-bank Offered Rate (SHIBOR), which is Chinese money market benchmark interest rate, and compare interest rate models of SHIBOR based on MCMC Method. Although SHIBOR has become an important interest rate, on which a lot of derivatives underlie, it is less studied. The Markov Chain Monte Carlo method is applied to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Conceptual Model of E-Commerce Sale Service for Manufacturing Industry

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    The Internet has become more and more important in connecting companies and customers. In this paper, we will analyze the e-commerce in manufacturing industry as an example to form a conceptual model of e-commerce sale service. E-commerce based on Internet offers manufacturers a new way to market their products and interact with end-consumers. For the first time, manufacturers can, through the Int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Document Watermarking Algorithm Based on Partitioned Character Image

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    A novel document watermarking algorithm for authentication, integrity and detection of tampering is proposed. In this algorithm a watermark generated from the characteristic of a binary document image is embedded into the document by modifying the flippable pixels. Experiment show that the watermarked document image has good visual quality and the embedded watermark can be extracted without the or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fragile Digital Watermark Used to Verify the Integrity of Vector Map

    Publication Year: 2009, Page(s):1 - 4
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    The methods of integrity authentication for vector maps were described at fist, then digital watermarking for vector data was introduced. Finally, a fragile watermark algorithm for vector maps was proposed, which was based on that the vector map was divided into a series of blocks, and watermark information was embedded in these blocks. The extraction procedure not only verifies the integrity of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Investigating the Impact of IT and E-Commerce Capability on Firm Performance: A Resource-Based View

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    In recent rapidly changing competitive environment, electric commerce plays an important role on value chain. Many firms invest IT to ensure their success on e-commerce. However, how affect the firm performance when using information systems in supporting organizational e-commerce activities is still a question. The purpose of the research is to explore how the IT infrastructure and e-commerce cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fuzzy Identity Based Signature Scheme

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    In this paper, we introduce a new type of identity based signature (IBS) scheme that we call fuzzy identity based signature (FIBS). In a FIBS scheme, user's identity are viewed as set of descriptive attributes. A user can use attributes omega to verify a signature signed with the attributes omega' if and only if omega and omega' are within a certain distance of each other as judged by some metric.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heuristic Scheduling Algorithm for Computing of Power Grid

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Task scheduling is an important issue in Power Grid. In Power Grid, Power system Computing applications are always broken down into several sub-tasks depending on each other, which can be represented as a DAG. Those sub-tasks often require specific grid resources and the computational capabilities of these resources may be different. So if we want to take advantage of Power Grid, an efficient sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A History-Based Constraint for Separation-of-Duty Policy in Role Based Access Control Model

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Separation-of-duty (SoD) is widely considered to be a fundamental principle in computer security. Role-based access control (RBAC) is today's dominant access control model, and supporting SoD policy is widely regarded as one of RBAC's main strengths. In this paper, we show that checking whether a RBAC state satisfies a given static SoD (SSoD) policy is a coNP-complete problem, and using statically... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Detection Approach for Zero-Day Polymorphic Shellcodes

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Zero-day shellcodes has become a major threat to the Internet with complex obfuscation techniques. However, even the state-of-the-art NIDS has small chances of detecting them because they rely on known signatures. This paper presents hybrid detection for zero-day polymorphic shellcodes (HDPS) against shellcodes using various obfuscations. Our approach employs a heuristic approach to detect return ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Load Balancing Schedule Strategy of Web Server Cluster

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    The paper raises a load schedule strategy of web server cluster, which comprehensively applies the multistage fuzzy system and the technique of artificial neural network to carry on fuzzy prediction for the user request of response delay, as considering prefix caching and patch prefetching technology of the Web node server, raises the load schedule algorithm based on the threshold value of respons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model of Evaluating E-Government Service Capability Based on Fuzzy Linguistic Approach

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    One of the main goals of e-government is increasing government service capability (GSC). GSC evaluation is a required work with strategic significance. The objective of this study is to investigate a fuzzy multiple attributes decision-making model for evaluating GSC. A framework for evaluating GSC is presented, which includes two parts, one is an evaluation hierarchy with attributes, the other a j... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modification on Public Key Infrastructure Application

    Publication Year: 2009, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    This paper describes a modification on public key infrastructure (PKI) application which aims to answer these questions that how to solve the compatible problem between the standard operation and special operation. It illustrates the modification by presenting operation rules system for a variety of personal special application.The modification is a new approach that we refer to as operation rules... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-Level Marketing Framework for Advertising in Social Network Services

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    In recent years, the growth of social network applications has held up very well. Many socializing tools like instant messaging software and blog platform can form a social network via constantly use. This paper proposes an advertising framework on social network. The main idea of this framework is to advertise on the nickname or status space on the social applications. This framework can also rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Network Monitor System Model with Performance Feedback Function

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    Network monitor system generally adopts packets interception, protocol analysis, address filter, and address cheat etc. to achieve its functions. These methods need extra time in the process of normal data transmission, which could affect the network performance especially under the condition of busy network and the low performance of the monitor server. The users will not accept the drawback that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.