11,804 research outputs found

    Service-oriented modeling for e-business applications components

    Get PDF
    The emerging trends for e-business engineering revolve around specialisation and cooperation. Successful companies focus on their core competences, and rely on a network of business partners for the support services required to compose a comprehensive offer for their customers. Modulariy is crucial for a flexible e-business infrastructure, but related requirements seldom reflect on the design and operational models of business information systems. Software components are widely used for the implementation of e-business applications, with proved benefits in terms of system development and maintenance. We propose a service-oriented componentisation of ebusiness systems as a way to close the gap with the business models they support. Blurring the distinction between external services and internal capabilities, we propose a homogeneous model for the definition of ebusiness applications components. After a brief discussion on the foundational aspects of the approach, we present the process-based technique we adopted for component modelling. We then present an infrastructure compliant with the model proposed that we built on top of an EJB (Enterprise Java Beans) platform

    Mapping service components to EJB business objects

    Get PDF
    The emerging trends for e-business engineering revolve around specialisation and cooperation. Successful companies focus on their core competencies and rely on a network of business partners for the support services required to compose a comprehensive offer for their customers. Modularity is crucial for a flexible e-business infrastructure, but related requirements seldom reflect on the design and operational models of business information systems. Software components are widely used for the implementation of e-business applications, with proven benefits in terms of system development and maintenance. We propose a service-oriented componentisation of e-business systems as a way to close the gap with the business models they support. Blurring the distinction between external services and internal capabilities, we propose a homogeneous model for the definition of e-business applications components and present a process-based technique for component modelling. We finally present an Enterprise Java Beans extension that implements the model

    Using Java powered iButton to replace student ID card

    Get PDF
    Not provided

    Citizen Electronic Identities using TPM 2.0

    Full text link
    Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensitive data have become commonplace both on PC platforms as well as mobile devices. Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of the Trusted Platform Module (TPM) specification. We propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0. The goal of the design is to improve the overall security and usability compared to traditional smart card-based solutions. We also provide, to the best our knowledge, the first accessible description of the TPM 2.0 authorization model.Comment: This work is based on an earlier work: Citizen Electronic Identities using TPM 2.0, to appear in the Proceedings of the 4th international workshop on Trustworthy embedded devices, TrustED'14, November 3, 2014, Scottsdale, Arizona, USA, http://dx.doi.org/10.1145/2666141.266614

    Academic Freedom of the Faculty Member as Citizen

    Get PDF
    A hi-tech company often focuses on being innovative by providing product offerings as product leader, fast follower or with operational excellence. In the international calling sector the technological solutions are numerous. The providers are, for instance, normal telecom providers, Voice over Internet Protocol (VoIP) and Mobile virtual network operators (MVNO). This means that a company faces not only the competitors that offer the same solution but also from outside the company’s business sector. The company thus needs to tackle many challenges, such as fast-paced product development, market expansion, competitor volatility, at the same time as the company cultivates its brand assets. This study focuses on the branding strategy within the VoIP telecom sector. It aims to set a guideline for how companies, in particular in the VoIP telecom sectors, cultivate and enhance their brand identity in order to differentiate themselves from competitors as well as achieve a successful and sustainable level of brand equity. The thesis also studies the brand strategies that have already manifested themselves within the providers of international calling services, in particular VoIP providers and a couple of MVNO providers. By conducting the brand identity and brand equity analysis, customer analysis and competitors’ analysis, a company can make a decision on brand strategy that will further associate, differentiate, energize and support its brands. The research framework consists of both the corporate and consumer perspectives. It consists of brand theory, market research, competitor analysis and the company’s brand identity, as well as brand awareness analysis. The thesis presents the Swedish VoIP consumers’ behavior and trends, the guideline and case study on how a company bridges the gap between brand identity and brand equity as well as the guideline and case study of brand portfolio strategies that have been explored within the VoIP telecom sectors, i.e. VoIP branding

    An integration bridge for heterogeneous e-service environments

    Get PDF
    Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de ComputadoresHome automation has evolved from a single integration of services (provided by devices, equipment, etc.) in the environment to a more broad integration of these core services with others(external to the environment) to create some added-value services for home users. This presents a key challenge of how to integrate disparate and heterogeneous e-service networks. To this, there exist already some good approaches but with some deficiencies. First, they fail to put in place some expeditious integration approach for having services registered across service domains. And then, do not provide a good method for having target services be transparently invoked from within the source environment. Thus, an enhanced integration concept is needed for tackling these challenges. As a solution, this work proposes an integration bridge concept, composed of two key elements: one, an interoperability bridge to go from service descriptions in the target environment format to service announcement in the source environment; and two, a service bridge, to have an image of the target service exist in the source environment as a service in itself. The concept has been tested and validated in JXTA-P2P source and W3C-WebServices target environments that much relate to Home Automation scenarios

    Academic Freedom of the Faculty Member as Citizen

    Get PDF
    The faculty member in an institution of higher learning functions in two capacities.He is, first of all, a scholar

    Constitutional Law - First Amendment - Free Exercise Clause - Establishment Clause - Schools and School Districts

    Get PDF
    The Supreme Court of Pennsylvania has held that inclusion of an invocation and benediction at a public high school commencement, at which attendance was voluntary, violated neither the free exercise clause nor the establishment clause of the first amendment of the United States Constitution nor that section of the Pennsylvania Constitution governing free exercise and establishment of religion. Wiest v. Mt. Lebanon School District, 457 Pa. 166, 320 A.2d 362, cert. denied, 419 U.S. 967 (1974)

    Implementing privacy with Erlang active objects

    Get PDF
    Functional active objects are a new paradigm for the implementation of services. They offer safe distributed eval- uation with futures and immutable objects guaranteeing efficient implementation of privacy while offering verified quality assurance based on the functional paradigm and a development in an interactive theorem prover. In this paper, we present a novel and highly performant implementation of functional active objects in Erlang. Besides outlining the guiding principles of the interpreter, we show by concrete examples how secure services can be realized

    WISM 2005 : web information systems modeling

    Get PDF
    Modern Web Information Systems (WIS) need to satisfy a large number of requirements coming from different WIS stakeholders. Modeling WIS by focusing at one design aspect at-a-time helps the implementation of these requirements. During the last years several model-driven methodologies have been proposed to support the WIS design. Strategic modeling is usually the first step in WIS design. It is a very general characterization of WIS which answers questions like: what is the purpose of the WIS?, which are the WIS users?, what functionality is provided by the WIS?, what is the content of the WIS?, what is the layout and atmosphere of the presentations provided by the WIS?, etc. It is only after answering the above questions at a high abstract level that the designer can proceed with the detailed specifications of the WIS. Data integration is one of the most important characteristics of WIS. Some examples of domains in which data integration is present are: public services and bioinformatics. WIS need to support user interfaces that make a lot of data coming from different sources available to the user in a transparent way. The Semantic Web technologies seem to facilitate the data integration problem on the Web by providing the necessary languages to describe the data semantics. Very often the Web user browses pages that he will like to view again at a later time. The present browsing history mechanisms included in Web browsers proved to be insufficient for an adequate retrieval of already seen information. A semantical organization of the previously visited pages can improve the process of retrieving previously seen data. There is an increasing demand to make WIS personalizable so that these systems better deal with the user interests. WIS design methodologies do propose adaptation techniques in order to realize WIS personalization. Despite the fact that some of these adaptation techniques are very similar (or even the same) in different methodologies, the notations to specify WIS personalization aspects are quite different. By defining a reference model for specifying WIS personalization one could improve the reuse of the personalization specifications and also enable a seamless translation between different specific personalization specifications. The above issues are some of the topics that are tackled in the workshop papers. We hope that we did raise the readers’ interest so that they will have a close look at the papers and possibly contribute to the fascinating and challenging area of WIS modeling
    • 

    corecore