71,405 research outputs found
Writing Other Peoples’ Constitutions
Secure mobile payment methods are typically needed in mobile access channels, it is vital toapply them when using mobile payment applications, which have arisen as a result of the increase of e-commerce. Currently, there are some payment methods that most of them can be used when conducting transactions but, they differ in terms of functionality, usability, costs or security. What makes mobile payment system more useful and necessary are the features and functionalities which are essentially based on customer needs that may differ in different market places, social categories and regions. In addition to payment system functionality, what mainly matters is securing payment methods with sufficient security protections. In this thesis, it is been tried to introduce some features currently lacking in mobile payment systems to propose a security architecture and then to present a solution for prospective problems with some current mobile payment systems and applications. The solution mainly implements what has been proposed and required to fulfill system requirements. The proposed security architecture supports already designed mobile payment system (SAFE) which typically interacts with the merchant and the customer for performing secure payment transactions. Mobile payment security architecture is designed, implemented and analyzed to be highly scalable and modular in addition to providing the desired security requirements set to it in this thesis work. The architecture is enhanced with mobile applications, so called SAFE apps, enabling securely authorizing e-commerce transactions. This report begins with introducing mobile payment system technologies, concept and architecture as the foundation for this work. The systems relevant to the one proposed in this thesis are briefly discussed in terms of functionality and security issues. System architecture and design of SAFE Mobile Payment System are briefly discussed as the core component of the settling e-commerce functions in a holistic view. The functionality and security issues ofthe system design and implementation are presented and finally the work is analyzed to determine how the project objectives were met
Mobile agents over e-business
[[abstract]]Due to the popularization of Internet and World Wide Web (WWW), thelimitation of distance and region are broken for business behaviors.E-Commerce can help a company or enterprise to extend its market placeto unlimited region. Agent technique is one of the importanttechnologies developed to support the Internet applications.Especially, the Internet and WWW technologies broken the limitation ofspace of enterprise marketing, and the agent techniques solve theproblems of temporality. Because of when the users are off-line, theagents are still active in the world of computer network and play therole of their users. In this paper, a mechanism is proposed forelectronic marketplace based on agents and mobile agents. There aresome issues will be researched. They include the platform of mobileagents, the types and classifications of agents and mobile agents,behaviors of commerce transactions and processing models, negotiationmechanisms, authentication and security, ...etc. Moreover, theyinclude the techniques of information retrieval, data mining, andknowledge base, ...etc. Based on this architecture of E-marketplace,the applications of E-commerce will be more effective, easier todevelop, and more creating the marketing of business.[[sponsorship]]淡江大學[[notice]]補正完畢[[conferencetype]]國際[[conferencetkucampus]]淡水校園[[conferencedate]]20010926~20010928[[booktype]]紙本[[iscallforpapers]]Y[[conferencelocation]]臺北縣, 臺
Recommended from our members
A multi-agent architecture for electronic payment
The Internet has brought about innumerable changes to the way enterprises do business. An essential problem to be solved before the widespread commercial use of the Internet is to provide a trustworthy solution for electronic payment. We propose a multi-agent mediated electronic payment architecture in this paper. It is aimed at providing an agent-based approach to accommodate multiple e-payment schemes. Through a layered design of the payment structure and a well-defined uniform payment interface, the architecture shows good scalability. When a new e-payment scheme or implementation is available, it can be plugged into the framework easily. In addition, we construct a framework allowing multiple agents to work cooperatively to realize automation of electronic payment. A prototype has been built to illustrate the functionality of this design. Finally we discuss the security issues
Agent fabrication and its implementation for agent-based electronic commerce
In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications
Recommended from our members
A modularized electronic payment system for agent-based e-commerce
With the explosive growth of the Internet, electronic-commerce (e-commerce) is an increasingly important segment of commercial activities on the web. The Secure Agent Fabrication, Evolution & Roaming (SAFER) architecture was proposed to further facilitate e-commerce using agent technology. In this paper, the electronic payment aspect of SAFER will be explored. The Secure Electronic Transaction (SET) protocol and E-Cash were selected as the bases for the electronic payment system implementation. The various modules of the payment system and how they interface with each other are shown. An extensible implementation done using JavaTM will also be elaborated. This application incorporates agent roaming functionality and the ability to conduct e-commerce transactions and carry out intelligent e-payment procedures
Framework of Smart Mobile Rfid Networks
Basically RFID (radio-frequency identification) is a wireless communication technology within the L1 (Layer 1, the physical layer of the OSI 7-layer Reference Model) and L2 scopes between RFID tag and reader. The RFID reader reads the code in the RFID tag and interprets it by communicating with the IS(information services)Â server via a proper communication network. This is the typical architecture defined by EPC (electronic product Code)global. RFID networks need to provide value added services in order to give better visibility to inventory movement across supply chain or closed loop applications like Asset tracking or Work In Progress tracking. The RFID reader can be stationary or mobile. A mobile RFID reader affords more applications than the stationary one. Mobile RFID is a newly emerging technology which uses the mobile phone as an RFID reader with a wireless technology and provides new valuable services to the user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. The mobile RFID enables business to provide new services to mobile customers by securing services and transactions from the end-user to a company's existing e-commerce and IT systems. In this paper, I describe about the core components of mobile RFID, advantages and its applications in scenario of smart networks. Although there are several types of mobile RFID readers in the market, I focused on mobile RFID technology that has several positive features including security, network architecture, operation scenario, and code resolution mechanism. Keywords: EPC network, RFID, Mobile RFID, Smart RFID networ
SAFE: Secure-Roaming Agents for E-commerce
The development of the Internet has made a powerful impact on the concept of commerce. E-commerce, a new way to conduct business, is gaining more and more popularity. Despite its rapid growth, there are limitations that hinder the expansion of e-commerce. The primary concern for most people when talking about on-line shopping is security. Due to the open nature of the Internet, personal financial details necessary for on-line shopping can be stolen if sufficient security mechanism is not put in place. How to provide the necessary assurance of security to consumers remains a question mark despite various past efforts. Another concern is the lack of intelligence. The Internet is an ocean of information depository. It is rich in content but lacks the necessary intelligent tools to help one locate the correct piece of information. Intelligent agent, a piece of software that can act on behalf of its owner intelligently, is designed to fill this gap. However, no matter how intelligent an agent is, if it remains on its owner’s machine and does not have any roaming capability, its functionality is limited. With the roaming capability, more security concerns arise. In response to these concerns, SAFE, Secure roaming Agent For E-commerce, is designed to provide secure roaming capability to intelligent agents
Recommended from our members
Business model requirements and challenges in the mobile telecommunication sector
The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization, and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak Business Models (BMs). Designing a BM for a mobile network operator is complex and requires multiple actors to balance different and often conflicting design requirements. Hence, there is a need to enhance operators’ ability in determining what constitutes the most viable business model to meet their strategic objectives within this turbulent environment. In this paper, the authors identify the main mobile BM dimensions along with their interdependencies and further analysis provides mobile network operators with insights to improve their business models in this new ‘boundary-less’ landscape
ERP implementation for an administrative agency as a corporative frontend and an e-commerce smartphone app
This document contains all the descriptions, arguments and demonstrations of the researches, analysis, reasoning, designs and tasks performed to achieve the requirement to technologically evolve an managing agency in a way that, through a solution that requires a reduced investment, makes possible to arrange a business management tool with e-commerce and also a mobile application that allows access and consultation of mentioned tool. The first part of the document describes the scenario in order to contextualize the project and introduces ERP (Enterprise Resources Planning). In the second part, a deep research of ERP market products is carried out, identifying the strengths and weaknesses of each one of the products in order to finish with the choice of the most suitable product for the scenario proposed in the project. A third part of the document describes the installation process of the selected product carried out based on the use of Dockers, as well as the configurations and customizations that they make on the selected ERP. A description of the installation and configuration of additional modules is also made, necessary to achieve the agreed scope of the project. In a fourth part of the thesis, the process of creating an iOS and Android App that connects to the selected ERP database is described. The process begins with the design of the App. Once designed, it is explained the process of study and documentation of technologies to choose the technology stack that allows making an application robust and contemporary without use of licensing. After choosing the technologies to use there are explained the dependencies and needs to install runtime enviornments prior to the start of coding. Later, it describes how the code of the App has been raised and developed. The compilation and verification mechanisms are indicated in continuation. And finally, it is showed the result of the development of the App once distributed. Finally, a chapter for the conclusions analyzes the difficulties encountered during the project and the achievements, analyzing what has been learned during the development of this project
- …