69,810 research outputs found

    Anonymous network access using the digital marketplace

    Get PDF
    With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. Previously-published anonymous communication schemes aim to obscure their users' network addresses, because real-world identity can be easily be derived from this information. We propose modifications to a novel call-management architecture, the digital marketplace, which will break this link, therefore enabling truly anonymous network access

    Agent fabrication and its implementation for agent-based electronic commerce

    Get PDF
    In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications

    A Factory-based Approach to Support E-commerce Agent Fabrication

    Get PDF
    With the development of Internet computing and software agent technologies, agent-based e-commerce is emerging. How to create agents for e-commerce applications has become an important issue along the way to success. We propose a factory-based approach to support agent fabrication in e-commerce and elaborate a design based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) framework. The details of agent fabrication, modular agent structure, agent life cycle, as well as advantages of agent fabrication are presented. Product-brokering agent is employed as a practical agent type to demonstrate our design and Java-based implementation

    Online kiosks: the alternative to mobile technologies for mobile users

    Get PDF
    Online kiosks have the potential to be a significant alternative to mobile technologies in retailing, information provision and service delivery. This article describes the development and use of different types of online kiosk in contexts where users are on the move and away from fixed technologies. A case study of a major UK airport terminal is used to illustrate different types of kiosk applications. Comparisons are made with mobile phone technologies. Online kiosks have a niche in allowing access to information, services and e-commerce technologies for all potential consumers. However, they also have a much wider role in self-managed, self-service delivery of information, services, goods and relationships to consumers on the move.</p

    Fighting Poverty, Profitably: Transforming the Economics of Payments to Build Sustainable, Inclusive Financial Systems

    Get PDF
    The Gates Foundation's Financial Services for the Poor program (FSP) believes that effective financial services are paramount in the fight against poverty. Nonetheless, today more than 2 billion people live outside the formal financial sector. Increasing their access to high quality, affordable financial services will accelerate the well-being of households, communities, and economies in the developing world. One of the most promising ways to deliver these financial services to the poor -- profitably and at scale -- is by using digital payment platforms.These are the conclusions we have reached as the result of extensive research in pursuit of one of the Foundation's primary missions: to give the world's poorest people the chance to lift themselves out of hunger and extreme poverty.FSP conducted this research because we believe that there is a gap in the fact base and understanding of how payment systems can extend digital services to low income consumers in developing markets. This is a complex topic, with fragmented information and a high degree of country-by-country variability. A complete view across the entire payment system has been missing, limiting how system providers, policy makers, and regulators (groups we refer to collectively as financial inclusion stakeholders) evaluate decisions and take actions. With a holistic view of the payment system, we believe that interventions can have higher impact, and stakeholders can better understand and address the ripple effects that changes to one part of the system can have. In this report, we focus on the economics of payment systems to understand how they can be transformed to serve poor people in a way that is profitable and sustainable in aggregate

    Enabling Privacy-preserving Auctions in Big Data

    Full text link
    We study how to enable auctions in the big data context to solve many upcoming data-based decision problems in the near future. We consider the characteristics of the big data including, but not limited to, velocity, volume, variety, and veracity, and we believe any auction mechanism design in the future should take the following factors into consideration: 1) generality (variety); 2) efficiency and scalability (velocity and volume); 3) truthfulness and verifiability (veracity). In this paper, we propose a privacy-preserving construction for auction mechanism design in the big data, which prevents adversaries from learning unnecessary information except those implied in the valid output of the auction. More specifically, we considered one of the most general form of the auction (to deal with the variety), and greatly improved the the efficiency and scalability by approximating the NP-hard problems and avoiding the design based on garbled circuits (to deal with velocity and volume), and finally prevented stakeholders from lying to each other for their own benefit (to deal with the veracity). We achieve these by introducing a novel privacy-preserving winner determination algorithm and a novel payment mechanism. Additionally, we further employ a blind signature scheme as a building block to let bidders verify the authenticity of their payment reported by the auctioneer. The comparison with peer work shows that we improve the asymptotic performance of peer works' overhead from the exponential growth to a linear growth and from linear growth to a logarithmic growth, which greatly improves the scalability
    corecore