71,405 research outputs found

    Writing Other Peoples’ Constitutions

    Get PDF
    Secure mobile payment methods are typically needed in mobile access channels, it is vital toapply them when using mobile payment applications, which have arisen as a result of the increase of e-commerce. Currently, there are some payment methods that most of them can be used when conducting transactions but, they differ in terms of functionality, usability, costs or security. What makes mobile payment system more useful and necessary are the features and functionalities which are essentially based on customer needs that may differ in different market places, social categories and regions. In addition to payment system functionality, what mainly matters is securing payment methods with sufficient security protections. In this thesis, it is been tried to introduce some features currently lacking in mobile payment systems to propose a security architecture and then to present a solution for prospective problems with some current mobile payment systems and applications. The solution mainly implements what has been proposed and required to fulfill system requirements. The proposed security architecture supports already designed mobile payment system (SAFE) which typically interacts with the merchant and the customer for performing secure payment transactions. Mobile payment security architecture is designed, implemented and analyzed to be highly scalable and modular in addition to providing the desired security requirements set to it in this thesis work. The architecture is enhanced with mobile applications, so called SAFE apps, enabling securely authorizing e-commerce transactions. This report begins with introducing mobile payment system technologies, concept and architecture as the foundation for this work. The systems relevant to the one proposed in this thesis are briefly discussed in terms of functionality and security issues. System architecture and design of SAFE Mobile Payment System are briefly discussed as the core component of the settling e-commerce functions in a holistic view. The functionality and security issues ofthe system design and implementation are presented and finally the work is analyzed to determine how the project objectives were met

    Mobile agents over e-business

    Get PDF
    [[abstract]]Due to the popularization of Internet and World Wide Web (WWW), thelimitation of distance and region are broken for business behaviors.E-Commerce can help a company or enterprise to extend its market placeto unlimited region. Agent technique is one of the importanttechnologies developed to support the Internet applications.Especially, the Internet and WWW technologies broken the limitation ofspace of enterprise marketing, and the agent techniques solve theproblems of temporality. Because of when the users are off-line, theagents are still active in the world of computer network and play therole of their users. In this paper, a mechanism is proposed forelectronic marketplace based on agents and mobile agents. There aresome issues will be researched. They include the platform of mobileagents, the types and classifications of agents and mobile agents,behaviors of commerce transactions and processing models, negotiationmechanisms, authentication and security, ...etc. Moreover, theyinclude the techniques of information retrieval, data mining, andknowledge base, ...etc. Based on this architecture of E-marketplace,the applications of E-commerce will be more effective, easier todevelop, and more creating the marketing of business.[[sponsorship]]淡江大學[[notice]]補正完畢[[conferencetype]]國際[[conferencetkucampus]]淡水校園[[conferencedate]]20010926~20010928[[booktype]]紙本[[iscallforpapers]]Y[[conferencelocation]]臺北縣, 臺

    Agent fabrication and its implementation for agent-based electronic commerce

    Get PDF
    In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications

    Framework of Smart Mobile Rfid Networks

    Get PDF
    Basically RFID (radio-frequency identification) is a wireless communication technology within the L1 (Layer 1, the physical layer of the OSI 7-layer Reference Model) and L2 scopes between RFID tag and reader. The RFID reader reads the code in the RFID tag and interprets it by communicating with the IS(information services)  server via a proper communication network. This is the typical architecture defined by EPC (electronic product Code)global. RFID networks need to provide value added services in order to give better visibility to inventory movement across supply chain or closed loop applications like Asset tracking or Work In Progress tracking. The RFID reader can be stationary or mobile. A mobile RFID reader affords more applications than the stationary one. Mobile RFID is a newly emerging technology which uses the mobile phone as an RFID reader with a wireless technology and provides new valuable services to the user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. The mobile RFID enables business to provide new services to mobile customers by securing services and transactions from the end-user to a company's existing e-commerce and IT systems. In this paper, I describe about the core components of mobile RFID, advantages and its applications in scenario of smart networks. Although there are several types of mobile RFID readers in the market, I focused on mobile RFID technology that has several positive features including security, network architecture, operation scenario, and code resolution mechanism. Keywords: EPC network, RFID, Mobile RFID, Smart RFID networ

    SAFE: Secure-Roaming Agents for E-commerce

    Get PDF
    The development of the Internet has made a powerful impact on the concept of commerce. E-commerce, a new way to conduct business, is gaining more and more popularity. Despite its rapid growth, there are limitations that hinder the expansion of e-commerce. The primary concern for most people when talking about on-line shopping is security. Due to the open nature of the Internet, personal financial details necessary for on-line shopping can be stolen if sufficient security mechanism is not put in place. How to provide the necessary assurance of security to consumers remains a question mark despite various past efforts. Another concern is the lack of intelligence. The Internet is an ocean of information depository. It is rich in content but lacks the necessary intelligent tools to help one locate the correct piece of information. Intelligent agent, a piece of software that can act on behalf of its owner intelligently, is designed to fill this gap. However, no matter how intelligent an agent is, if it remains on its owner’s machine and does not have any roaming capability, its functionality is limited. With the roaming capability, more security concerns arise. In response to these concerns, SAFE, Secure roaming Agent For E-commerce, is designed to provide secure roaming capability to intelligent agents

    ERP implementation for an administrative agency as a corporative frontend and an e-commerce smartphone app

    Get PDF
    This document contains all the descriptions, arguments and demonstrations of the researches, analysis, reasoning, designs and tasks performed to achieve the requirement to technologically evolve an managing agency in a way that, through a solution that requires a reduced investment, makes possible to arrange a business management tool with e-commerce and also a mobile application that allows access and consultation of mentioned tool. The first part of the document describes the scenario in order to contextualize the project and introduces ERP (Enterprise Resources Planning). In the second part, a deep research of ERP market products is carried out, identifying the strengths and weaknesses of each one of the products in order to finish with the choice of the most suitable product for the scenario proposed in the project. A third part of the document describes the installation process of the selected product carried out based on the use of Dockers, as well as the configurations and customizations that they make on the selected ERP. A description of the installation and configuration of additional modules is also made, necessary to achieve the agreed scope of the project. In a fourth part of the thesis, the process of creating an iOS and Android App that connects to the selected ERP database is described. The process begins with the design of the App. Once designed, it is explained the process of study and documentation of technologies to choose the technology stack that allows making an application robust and contemporary without use of licensing. After choosing the technologies to use there are explained the dependencies and needs to install runtime enviornments prior to the start of coding. Later, it describes how the code of the App has been raised and developed. The compilation and verification mechanisms are indicated in continuation. And finally, it is showed the result of the development of the App once distributed. Finally, a chapter for the conclusions analyzes the difficulties encountered during the project and the achievements, analyzing what has been learned during the development of this project
    corecore