45 research outputs found
Social Commerce: A Literature Review
The increasing popularity of social networking is providing new opportunities for businesses in electronic commerce. It is evolving in order to adopt Web 2.0 capabilities to support online customer interactions and achieve greater economic value. This trend is referred to as social commerce. This study offers the result of a Systematic Literature Review (SLR) to explain the concept of social commerce. In order to elaborate this article, 64 papers were considered from the main digital libraries that index computer science conferences and journals. Applying a systematic analysis to these papers, it was possible to summarize the existing evidence concerning the social commerce and outline some open challenges
SmartSocialMarket: A Social Commerce Architecture
The evolution of the approach users have with the World Wide Web-particularly towards social media-has led to the need of e-commerce platforms aimed at user interaction. Offering a service focussing only on online shopping is no longer satisfactory. In order to provide a successful user-seller interaction, further Web 2.0 tools need to be offered. This development of electronic shopping-which provides new business opportunities-is called social commerce. This paper aims at describing the SmartSocialMarket architecture, which is based on e-commerce components and, at an upper level, on social components. Social components allow for the provision of tools that can improve the user interaction within the platform, and can also offer new market opportunities to sellers
Security-Oriented Formal Techniques
Security of software systems is a critical issue in a world where Information Technology is becoming more and more pervasive. The number of services for everyday life that are provided via electronic networks is rapidly increasing, as witnessed by the longer and longer list of words with the prefix "e", such as e-banking, e-commerce, e-government, where the "e" substantiates their electronic nature. These kinds of services usually require the exchange of sensible data and the sharing of computational resources, thus needing strong security requirements because of the relevance of the exchanged information and the very distributed and untrusted environment, the Internet, in which they operate. It is important, for example, to ensure the authenticity and the secrecy of the exchanged messages, to establish the identity of the involved entities, and to have guarantees that the different system components correctly interact, without violating the required global properties
A Survey of Trust Management Models for Cloud Computing
Over the past few years, cloud computing has been widely adopted as a paradigm for large-scale infrastructures.
In such a scenario, new security risks arise when different entities or domains share the same group
of resources. Involved organizations need to establish some kind of trust relationships, able to define appropriate
rules that can control which and how resources and services are going to be shared. The management
of trust relationships represents a key challenge in order to meet high security requirements in cloud computing
environments. This allows also to boost consumers confidence in cloud services, promoting its adoption.
Establishing trust with cloud service providers supports to have confidence, control, reliability, and to avoid
commercial issues like lock in. This paper proposes a survey of existing trust management models addressing
collaboration agreements in cloud computing scenarios. Main limitations of current approaches are outlined
and possible improvements are traced, as well as a future research path
Identity management in cloud platforms using VOMS and SPID
Cloud computing is being adopted more and more in recent years. It offers several benefits, such as high elasticity, availability and cost reduction, but yet presents some issues. Among the most important, the potential lack of security can affect the spreading of this technology. As cloud computing is pushing forward to the digital era, where users can have their own digital identity to access restricted resources or services, a reliable authentication and authorization system would attract more users to get involved in such process. This paper proposes an integration of the VOMS (Virtual Organization Membership Service) system for authorization and SPID (Sistema Pubblico per la gestione dell'Identità Digitale) system for authentication, within Cloud Foundry PaaS (Platform as a Service) model. Considerations, differences and interoperability matters will be addressed in order to provide a comprehensive scheme
FedCohesion: Federated Identity Management in the Marche Region
Federated identity management is a set of technologies and processes supporting dynamically distribute identity information. Its adoption in Public Administrations maintains organizations autonomy giving at the same time citizens support to access the services that are distributed across security domains.
In this paper, we propose the Marche Region experience for what concern federate identity management focusing on the regional authentication framework, named FedCohesion. It is bases on Security Assertion Markup Language standard and it results from Cohesion re-engineering. It is the old style legacy authentication framework. We first present resulting architecture showing supported identification process and pilot applications. Lessons learned and opportunities have been also presented
Climacostol reduces tumour progression in a mouse model of melanoma via the p53-dependent intrinsic apoptotic programme
Climacostol, a compound produced by the ciliated protozoan Climacostomum virens, displayed cytotoxic properties in vitro. This study demonstrates that it has anti-tumour potential. Climacostol caused a reduction of viability/proliferation of B16-F10 mouse melanoma cells, a rapidly occurring DNA damage, and induced the intrinsic apoptotic pathway characterised by the dissipation of the mitochondrial membrane potential, the translocation of Bax to the mitochondria, the release of Cytochrome c from the mitochondria, and the activation of Caspase 9-dependent cleavage of Caspase 3. The apoptotic mechanism of climacostol was found to rely on the up-regulation of p53 and its targets Noxa and Puma. In vivo analysis of B16-F10 allografts revealed a persistent inhibition of tumour growth rate when melanomas were treated with intra-tumoural injections of climacostol. In addition, it significantly improved the survival of transplanted mice, decreased tumour weight, induced a remarkable reduction of viable cells inside the tumour, activated apoptosis and up-regulated the p53 signalling network. Importantly, climacostol toxicity was more selective against tumour than non-tumour cells. The anti-tumour properties of climacostol and the molecular events associated with its action indicate that it is a powerful agent that may be considered for the design of pro-apoptotic drugs for melanoma therapy