44 research outputs found

    Social Commerce: A Literature Review

    Get PDF
    The increasing popularity of social networking is providing new opportunities for businesses in electronic commerce. It is evolving in order to adopt Web 2.0 capabilities to support online customer interactions and achieve greater economic value. This trend is referred to as social commerce. This study offers the result of a Systematic Literature Review (SLR) to explain the concept of social commerce. In order to elaborate this article, 64 papers were considered from the main digital libraries that index computer science conferences and journals. Applying a systematic analysis to these papers, it was possible to summarize the existing evidence concerning the social commerce and outline some open challenges

    SmartSocialMarket: A Social Commerce Architecture

    Get PDF
    The evolution of the approach users have with the World Wide Web-particularly towards social media-has led to the need of e-commerce platforms aimed at user interaction. Offering a service focussing only on online shopping is no longer satisfactory. In order to provide a successful user-seller interaction, further Web 2.0 tools need to be offered. This development of electronic shopping-which provides new business opportunities-is called social commerce. This paper aims at describing the SmartSocialMarket architecture, which is based on e-commerce components and, at an upper level, on social components. Social components allow for the provision of tools that can improve the user interaction within the platform, and can also offer new market opportunities to sellers

    Security-Oriented Formal Techniques

    Get PDF
    Security of software systems is a critical issue in a world where Information Technology is becoming more and more pervasive. The number of services for everyday life that are provided via electronic networks is rapidly increasing, as witnessed by the longer and longer list of words with the prefix "e", such as e-banking, e-commerce, e-government, where the "e" substantiates their electronic nature. These kinds of services usually require the exchange of sensible data and the sharing of computational resources, thus needing strong security requirements because of the relevance of the exchanged information and the very distributed and untrusted environment, the Internet, in which they operate. It is important, for example, to ensure the authenticity and the secrecy of the exchanged messages, to establish the identity of the involved entities, and to have guarantees that the different system components correctly interact, without violating the required global properties

    A Survey of Trust Management Models for Cloud Computing

    Get PDF
    Over the past few years, cloud computing has been widely adopted as a paradigm for large-scale infrastructures. In such a scenario, new security risks arise when different entities or domains share the same group of resources. Involved organizations need to establish some kind of trust relationships, able to define appropriate rules that can control which and how resources and services are going to be shared. The management of trust relationships represents a key challenge in order to meet high security requirements in cloud computing environments. This allows also to boost consumers confidence in cloud services, promoting its adoption. Establishing trust with cloud service providers supports to have confidence, control, reliability, and to avoid commercial issues like lock in. This paper proposes a survey of existing trust management models addressing collaboration agreements in cloud computing scenarios. Main limitations of current approaches are outlined and possible improvements are traced, as well as a future research path

    Identity management in cloud platforms using VOMS and SPID

    Get PDF
    Cloud computing is being adopted more and more in recent years. It offers several benefits, such as high elasticity, availability and cost reduction, but yet presents some issues. Among the most important, the potential lack of security can affect the spreading of this technology. As cloud computing is pushing forward to the digital era, where users can have their own digital identity to access restricted resources or services, a reliable authentication and authorization system would attract more users to get involved in such process. This paper proposes an integration of the VOMS (Virtual Organization Membership Service) system for authorization and SPID (Sistema Pubblico per la gestione dell'Identità Digitale) system for authentication, within Cloud Foundry PaaS (Platform as a Service) model. Considerations, differences and interoperability matters will be addressed in order to provide a comprehensive scheme

    FedCohesion: Federated Identity Management in the Marche Region

    Get PDF
    Federated identity management is a set of technologies and processes supporting dynamically distribute identity information. Its adoption in Public Administrations maintains organizations autonomy giving at the same time citizens support to access the services that are distributed across security domains. In this paper, we propose the Marche Region experience for what concern federate identity management focusing on the regional authentication framework, named FedCohesion. It is bases on Security Assertion Markup Language standard and it results from Cohesion re-engineering. It is the old style legacy authentication framework. We first present resulting architecture showing supported identification process and pilot applications. Lessons learned and opportunities have been also presented

    Climacostol reduces tumour progression in a mouse model of melanoma via the p53-dependent intrinsic apoptotic programme

    Get PDF
    Climacostol, a compound produced by the ciliated protozoan Climacostomum virens, displayed cytotoxic properties in vitro. This study demonstrates that it has anti-tumour potential. Climacostol caused a reduction of viability/proliferation of B16-F10 mouse melanoma cells, a rapidly occurring DNA damage, and induced the intrinsic apoptotic pathway characterised by the dissipation of the mitochondrial membrane potential, the translocation of Bax to the mitochondria, the release of Cytochrome c from the mitochondria, and the activation of Caspase 9-dependent cleavage of Caspase 3. The apoptotic mechanism of climacostol was found to rely on the up-regulation of p53 and its targets Noxa and Puma. In vivo analysis of B16-F10 allografts revealed a persistent inhibition of tumour growth rate when melanomas were treated with intra-tumoural injections of climacostol. In addition, it significantly improved the survival of transplanted mice, decreased tumour weight, induced a remarkable reduction of viable cells inside the tumour, activated apoptosis and up-regulated the p53 signalling network. Importantly, climacostol toxicity was more selective against tumour than non-tumour cells. The anti-tumour properties of climacostol and the molecular events associated with its action indicate that it is a powerful agent that may be considered for the design of pro-apoptotic drugs for melanoma therapy
    corecore