42,860 research outputs found
Recommended from our members
A multi-agent architecture for electronic payment
The Internet has brought about innumerable changes to the way enterprises do business. An essential problem to be solved before the widespread commercial use of the Internet is to provide a trustworthy solution for electronic payment. We propose a multi-agent mediated electronic payment architecture in this paper. It is aimed at providing an agent-based approach to accommodate multiple e-payment schemes. Through a layered design of the payment structure and a well-defined uniform payment interface, the architecture shows good scalability. When a new e-payment scheme or implementation is available, it can be plugged into the framework easily. In addition, we construct a framework allowing multiple agents to work cooperatively to realize automation of electronic payment. A prototype has been built to illustrate the functionality of this design. Finally we discuss the security issues
Recommended from our members
Integrity protection for code-on-demand mobile agents in e-commerce
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection
Recommended from our members
Integrating information and knowledge for enterprise innovation
It has widely been accepted that enterprise integration, can be a source of socio-technical and cultural problems within organisations wishing to provide a focussed end-to-end business service. This can cause possible “straitjacketing” of business process architectures, thus suppressing responsive business re-engineering and competitive advantage for some companies. Accordingly, the current typology and emergent forms of Enterprise Resource Planning (ERP) and Enterprise Application Integration (EAI) technologies are set in the context of understanding information and knowledge integration philosophies. As such, key influences and trends in emerging IS integration choices, for end-to-end, cost-effective and flexible knowledge integration, are examined. As touch points across and outside organisations proliferate, via work-flow and relationship management-driven value innovation, aspects of knowledge refinement and knowledge integration pose challenges to maximising the potential of innovation and sustainable success, within enterprises. This is in terms of the increasing propensity for data fragmentation and the lack of effective information management, in the light of information overload. Furthermore, the nature of IS mediation which is inherent within decision making and workflow-based business processes, provides the basis for evaluation of the effects of information and knowledge integration. Hence, the authors propose a conceptual, holistic evaluation framework which encompasses these ideas. It is thus argued that such trends, and their implications regarding enterprise IS integration to engender sustainable competitive advantage, require fundamental re-thinking
Challenges to describe QoS requirements for web services quality prediction to support web services interoperability in electronic commerce
Quality of service (QoS) is significant and necessary for web service applications quality assurance. Furthermore, web services quality has contributed to the successful implementation of Electronic Commerce (EC) applications. However, QoS is still the big issue for web services research and remains one of the main research questions that need to be explored. We believe that QoS should not only be measured but should also be predicted during the development and implementation stages. However, there are challenges and constraints to determine and choose QoS requirements for high quality web services. Therefore, this paper highlights the challenges for the QoS requirements prediction as they are not easy to identify. Moreover, there are many different perspectives and purposes of web services, and various prediction techniques to describe QoS requirements. Additionally, the paper introduces a metamodel as a concept of what makes a good web service
Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy
Abstract. Pursuing the purpose of effective functioning in today's conditions, the business is forced to transform rapidly, to modernize at all levels. The world
is changing, erasing the limits of its certainty. Companies need quality transformations and strategies that are effective in the face of rapid change towards
"deep" digitization. Massive corporate management systems increasingly need the flexibility to keep pace with change. And companies with an innovative culture
are more in need of creative tasks than implementing detailed regulations.
In the post-industrial time of digital economy, issues related to the development
of the information sphere, the media and communications, the usage of modern
information systems to develop the economy and stabilize social development
as a whole, come first. The basic principles of practical application of Blockchain
are investigated in the work. The stages of development of Blockchain
technology, the stages of development of Blockchain technologies by time, the
application of distributed registry technology in Blockchain applications, the
principles of construction and operation of Blockchain have been specified. The
benefits of using NEM for business are substantiated and the components of
Proxima X technology, protocols and service layers, on-line and off-line protocols,
decentralized applications are exposed
Interoperability of Information Systems and Heterogenous Databases Using XML
Interoperabilily of information systerrrs is the most critical issue facing businesse!
that need to access information from multiple idormution systems on
tlifferent environments ancl diverse platforms. Interoperability has been a basic
requirement for the modern information systems in a competitive and volatile
business environment, particularly with the advent of distributed network system
and the growing relevance of inter-network communications. Our objective
in tltis paper is to develop a comprehensiveframework tofacilitate interoperability
smong distributed and heterogeneous information systems and to develop prototype
software to validate tlte application of XML in interoperability of infurmation
systems and databases
- …