By Topic

2005 IEEE International Conference on e-Technology, e-Commerce and e-Service

Date March 29 2005-April 1 2005

Filter Results

Displaying Results 1 - 25 of 148
  • Proceedings. The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Officers

    Publication Year: 2005, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Program Committees

    Publication Year: 2005, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2005, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • Process-annotated service discovery facilitated by an n-gram-based index

    Publication Year: 2005, Page(s):2 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Service discovery in Web service infrastructure must consider abstract processes to guarantee successful business interactions with the matched services. Unfortunately, matchmaking process annotations requires a significant processing effort, thus, finding relevant service providers in a large collection is time consuming and requires more efficient access methods than sequential scanning. The pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving QoS-driven Web service dynamic composition as fuzzy constraint satisfaction

    Publication Year: 2005, Page(s):9 - 14
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    The creation of value-added composite web service raises an opportunity to the formation of online B2B collaborations. However, web services are usually overlapping in functionality. How to make a choice based on non-functional factors becomes a problem that needs to be solved. In this paper, it argues that the selection of component services should be considered in a global manner and the user's ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Web services composition using a transactional approach

    Publication Year: 2005, Page(s):15 - 21
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Web services are a key technology for automating inter-organizational interactions. Enterprises can externalise parts of their business processes using them. Then they can dynamically combine existing services to offer value added composite services (CS). One remaining problem is how to ensure a correct composition and a reliable execution of a CS with regards to partners' transactional requiremen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A broker-based framework for QoS-aware Web service composition

    Publication Year: 2005, Page(s):22 - 29
    Cited by:  Papers (27)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Web services are modular web applications that can be independently deployed and invoked by other software or services on the web. This offers enterprises the capability to integrate in-house business services with external Web services to conduct complex business transactions. The integration efficiency and flexibility are critical for services composition. For Web services providing a similar fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous call double auctions with indivisibility constraints

    Publication Year: 2005, Page(s):32 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    Double sided auctions provide an efficient mechanism to implement bidding based many to many negotiations. In these auctions, sellers and buyers submit asks and bids respectively. These bids and asks are matched and cleared periodically. Efficient algorithms exist to match these asks and bids in case there are no assignment constraints. In some problems, there can be situations where the supply fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive attitude bidding strategy for agents in continuous double auctions

    Publication Year: 2005, Page(s):38 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Continuous double auction (CDA) is a popular market institution for real-world trading of commodities as well as electronic marketplaces. In this paper, we present the design and analysis of a new strategy for buyer and seller agents participating in agent-based CDAs. We consider a series of CDAs, the participants of which have similar behaviors in any two successive CDAs. These strategies employ ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DR-NEGOTIATE - a system for automated agent negotiation with defeasible logic-based strategies

    Publication Year: 2005, Page(s):44 - 49
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    This paper reports on a system for automated agent negotiation. It uses the JADE agent framework, and its major distinctive feature is the use of declarative negotiation strategies. The negotiation strategies are expressed in a declarative rules language, defeasible logic and are applied using the implemented defeasible reasoning system DR-DEVICE. The choice of defeasible logic is justified. The o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic negotiation with mediated agents in e-commerce marketplace

    Publication Year: 2005, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    With the prevalence of Internet, many transactions on the traditional market have been successfully replaced by online transactions on the e-commerce market. In this paper, an agent-mediated e-mart framework is proposed. It will be able to accomplish various E-commerce tasks, such as partnership alliance, merchant brokering, and automatic negotiation. Especially, two kinds of automatic negotiation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic mapping with multi-agent systems

    Publication Year: 2005, Page(s):54 - 57
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    This paper introduces a multi-agent system (MAS) architecture and a relevant algorithm for multiple agents to manage and deploy ontologies in a dynamic environment. Firstly, an ontology description is given followed by a three level conceptual model which shows the background of our work. Then a MAS architecture is presented. Finally, we demonstrate how this approach enables ontology evolution and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency between executable and abstract processes

    Publication Year: 2005, Page(s):60 - 67
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Process models play an all-important role in the development of cross-organizational business processes. On the one hand, the interaction between the participating companies often is specified globally, for example by means of multiple abstract process models - one for each partner. On the other hand, each partner defines its local process autonomously in terms of an executable process model. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving survivability in business process execution language for Web services (BPEL) with exception-flows

    Publication Year: 2005, Page(s):68 - 74
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Survivability is defined as the capability of a service to fulfill its mission in a timely manner, even in the presence of attacks, failures, or accidents. Because of the severe consequences of failure, organizations are focusing on service survivability as a key risk management strategy for business processes. There are three key survivability properties: resistance, recognition, and recovery. Re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From multi-context business collaboration models to context-specific ebXML BPSS

    Publication Year: 2005, Page(s):75 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    UN/CEFACTs modelling methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific constraints to models. Now they might be shared by multiple business environments. The implementation of business process models is supported by choreography languages that can be process by applications. Choreography language... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Codifying business and process models for service-based eBusiness propositions

    Publication Year: 2005, Page(s):81 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB) | HTML iconHTML

    The notion of 'business models' for eBusiness is popular within both the academic and practitioner arenas; however, many of the models in use are static in nature and provide only a historical view. This paper demonstrates how traditional strategy theories and the emergent knowledge of eBusiness can be extended to provide a framework for unifying strategic business models for eBusiness with the bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business processes and workflow coordination of Web services

    Publication Year: 2005, Page(s):85 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Orchestration is currently presented as a way to coordinate Web services in order to define business processes. In this paper we revisit these concepts, showing the current limitation of workflow coordination of Web services, and we show that business process is different from Web service coordination. The paper presents how we have extended the capabilities of workflow for the orchestration and c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process-oriented business performance management with Petri nets

    Publication Year: 2005, Page(s):89 - 92
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (45 KB) | HTML iconHTML

    Modern business performance management (BPM) comprises modeling, analyzing and monitoring of business processes. A variety of different approaches for business performance management have emerged recently. One issue common to these approaches is the inability to link the business process schema to the information gathered during the relevant phases. In this paper, we present a Petri net-based appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSA-based verifiable and recoverable encryption of signatures and its application in certified e-goods delivery

    Publication Year: 2005, Page(s):94 - 99
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    We present a new method for verifiable and recoverable encryption of DSA signatures, and apply this cryptographic primitive in the design of a novel certified e-goods delivery (DSA-CEGD) protocol. The DSA-CEGD protocol has the following features: (1) ensures strong fairness, (2) ensures non-repudiation of origin and non-repudiation of receipt, (3) allows the receiver of an e-goods to verify, durin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protect e-commerce against DDoS attacks with improved D-WARD detection system

    Publication Year: 2005, Page(s):100 - 105
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    DDoS attack has caused severe damage to e-commerce and e-service and is great intimidation to the development of them. After analyzing the detection algorithm of D-WARD, a representative source-end DDoS detection system, we introduced a nonparametric change point detection method in statistics and improved D-WARD with nonparametric recursive CUSUM algorithm and compared their respective performanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A secure anonymous authorisation architecture for e-commerce

    Publication Year: 2005, Page(s):106 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    We propose a new authorisation architecture based on the extension to the anonymous authorisation framework proposed by Au et al., whereby a new entity, trustee, and a new concept, key binding certificate (KBC), are introduced. In the architecture, the trustee issues a KBC to certify the association between a registered user's unique identity and the user's one-task authorisation key (OTAK) where ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On splitting public keys for the public key infrastructure

    Publication Year: 2005, Page(s):112 - 115
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (41 KB) | HTML iconHTML

    Certificates and the public key infrastructure (PKI) play an vital role in electronic commerce. The framework of splitting the public key in the PKI is presented in this paper. Aimed to enhance the security level from both the perspectives of certificate issuing and certificate revocation, the framework splits the public key into multiple parts, and generates a certificate for each part. The frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.