標題: Titlebook: E-Commerce and Web Technologies; 4th International Co Kurt Bauknecht,A Min Tjoa,Gerald Quirchmayr Conference proceedings 2003 Springer-Verl [打印本頁] 作者: coerce 時間: 2025-3-21 19:57
書目名稱E-Commerce and Web Technologies影響因子(影響力)
書目名稱E-Commerce and Web Technologies影響因子(影響力)學科排名
書目名稱E-Commerce and Web Technologies網(wǎng)絡公開度
書目名稱E-Commerce and Web Technologies網(wǎng)絡公開度學科排名
書目名稱E-Commerce and Web Technologies被引頻次
書目名稱E-Commerce and Web Technologies被引頻次學科排名
書目名稱E-Commerce and Web Technologies年度引用
書目名稱E-Commerce and Web Technologies年度引用學科排名
書目名稱E-Commerce and Web Technologies讀者反饋
書目名稱E-Commerce and Web Technologies讀者反饋學科排名
作者: Arroyo 時間: 2025-3-21 22:15 作者: 軟弱 時間: 2025-3-22 02:57 作者: Dorsal-Kyphosis 時間: 2025-3-22 06:52 作者: 貪心 時間: 2025-3-22 09:16 作者: homocysteine 時間: 2025-3-22 15:56 作者: homocysteine 時間: 2025-3-22 18:09
A Security Architecture for Reputation Systemsotected from manipulation. Motivated by such needs a security architecture for reputation systems is proposed. Within the architecture several services are identified. In addition, the mechanisms and parameters to support the identified services are also determined.作者: frozen-shoulder 時間: 2025-3-22 22:09 作者: FLIT 時間: 2025-3-23 02:41
Conference proceedings 2003ns. The papers are organized in topical sections on auctions, security, agents and search, ebXML, modeling and technology, XML, design and performance, business processes, and brokering and recommender systems..作者: 留戀 時間: 2025-3-23 06:09 作者: 禮節(jié) 時間: 2025-3-23 13:06
conjunctive combinatorial bids that allows formulation of some fairness properties applicable when pricing is based solely on the buyer’s bids. We then give an example payment allocation algorithm that implements these properties.作者: 全國性 時間: 2025-3-23 14:48 作者: 合群 時間: 2025-3-23 18:13
0302-9743 ptember 2003....The 42 revised full papers presented together with an invited paper and a position paper were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on auctions, security, agents and search, ebXML, modeling and technology, XML, design and p作者: 惹人反感 時間: 2025-3-23 23:11
, digital goods have in common, that transaction costs are minimal (in comparison to conventional goods) since all logistic processes may happen consistent without changing the media of the Internet. This includes costs for information, arrangements, transaction, controlling and adapting of the bargain.作者: 百科全書 時間: 2025-3-24 05:06
need for an internet charity donation scheme, identify the security requirements such a scheme should fulfill, and propose a scheme that uses an anonymous electronic cash technique to make donations, and that employs smart cards for donation distribution. Finally, we analyse how the proposed scheme matches the identified security requirements.作者: GIST 時間: 2025-3-24 09:31
existing mobile secure mechanism, because anonymity on mobile payment transaction can be misused by attacker. Therefore, we propose tamper-proof smart card based efficient secure mobile e-coins with . 作者: 敲詐 時間: 2025-3-24 13:42
mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed ET-RBAC by applying it to an example of M-commerce service.作者: erythema 時間: 2025-3-24 15:14
Current Chinese Economic Report Seriessolve the bid evaluation problem in an automated contracting environment. This research endeavors to offer a better alternative to the solution of the bid evaluation problem by adopting the genetic local search (GLS) method.作者: 極小 時間: 2025-3-24 19:19 作者: Mirage 時間: 2025-3-25 01:15
otected from manipulation. Motivated by such needs a security architecture for reputation systems is proposed. Within the architecture several services are identified. In addition, the mechanisms and parameters to support the identified services are also determined.作者: municipality 時間: 2025-3-25 05:41
ead of modifying web services engine. It also supports extensibility since it has been developed based on international standards such as WS-Security, XKMS, XML Encryption, and XML Signature specifications. The proposed solution provides clients and servers in the business to business environments with confidence and security.作者: 有雜色 時間: 2025-3-25 07:56
h the GSM subscriber identity in such a way that without a mobile station, in particular the SIM, and the corresponding debit/credit card, an unscrupulous user will find it difficult to make a fraudulent payment at the expense of the legitimate cardholder. This is achieved in such a way that no management overhead is imposed on the user.作者: hemorrhage 時間: 2025-3-25 15:28 作者: Decrepit 時間: 2025-3-25 19:24 作者: 感激小女 時間: 2025-3-25 21:14 作者: Gnrh670 時間: 2025-3-26 02:25
er can include several business rules and purchasing policies as side constraints in the optimization problem to evaluate the winning bids. We propose the use of goal programming techniques to solve the bid evaluation problem.作者: machination 時間: 2025-3-26 07:20
total revenue. This variant of a Dutch auction guarantees that the sum of the face value of all used coupons will be less than (or equal to) the increase in the revenue caused by their use. As a result the realized revenue will be higher than the revenue received in a typical Dutch auction with the same settings.作者: 斗爭 時間: 2025-3-26 11:40 作者: Orgasm 時間: 2025-3-26 16:34 作者: 占卜者 時間: 2025-3-26 20:26 作者: 水土 時間: 2025-3-27 00:46 作者: Pastry 時間: 2025-3-27 05:07 作者: VEST 時間: 2025-3-27 09:09 作者: osteoclasts 時間: 2025-3-27 12:00 作者: 笨重 時間: 2025-3-27 13:48 作者: 載貨清單 時間: 2025-3-27 18:56 作者: Instantaneous 時間: 2025-3-28 01:11
https://doi.org/10.1007/b11826B2B; Distribution; E-Business; Mobile Payment; Signatur; XML; business process; e-auctions; e-commerce; e-com作者: municipality 時間: 2025-3-28 05:18
978-3-540-40808-6Springer-Verlag Berlin Heidelberg 2003作者: nonplus 時間: 2025-3-28 10:09
E-Commerce and Web Technologies978-3-540-45229-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 不透明性 時間: 2025-3-28 10:36 作者: 食草 時間: 2025-3-28 18:06 作者: 建筑師 時間: 2025-3-28 20:22 作者: trigger 時間: 2025-3-29 00:43
able of clearing combinatorial exchanges. The Vickrey-Groves-Clarke mechanism, which has been successfully applied in the case of one-sided combinatorial auctions, is not budget-balanced when generalized to two-sided auctions. We present a new model for an auction market with autonomous traders and 作者: Chromatic 時間: 2025-3-29 04:13
vices and matchmaking facilities and explains why directories such as UDDI are important but insufficient for web services and need to be complemented with advanced matchmaking facilities. It discusses the requirements that web services place on matchmaking, namely symmetry of information exchange, 作者: 小隔間 時間: 2025-3-29 08:09
anonymity requirements of many donors, however, make the existing means of donation inappropriate for them. In this paper we investigate the business need for an internet charity donation scheme, identify the security requirements such a scheme should fulfill, and propose a scheme that uses an anony作者: 畫布 時間: 2025-3-29 13:08 作者: TAIN 時間: 2025-3-29 16:20 作者: 尖叫 時間: 2025-3-29 19:47
paper we propose ET-RBAC based Wireless Privilege Management Infrastructure(WPMI) model and Wireless Attribute Certificate(WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are作者: murmur 時間: 2025-3-30 00:50
and certificate revocation services, although very costly in practice, must be available to prevent big loss due to compromising of the signing key. In this paper, we employ a revocation-free public-key framework to improve the efficiency in maintaining the validity of digital signatures as non-rep作者: hematuria 時間: 2025-3-30 04:05 作者: CHART 時間: 2025-3-30 11:15
https://doi.org/10.1057/978-1-137-59605-5rtunities to business of all sizes as well as convenience to consumers. These benefits are not reaped without danger for merchants and consumers. When a purchase list or an invoice is created it may get infected with some modification by intruder before the signature is attached to it. We proposed a作者: 鍵琴 時間: 2025-3-30 15:21 作者: Ischemia 時間: 2025-3-30 17:45 作者: Range-Of-Motion 時間: 2025-3-30 23:10
g focused on as the leading electronic commerce framework. The adoption of standards such as ebXML is probably the best way to achieve interoperability among electronic commerce systems, and more and more e-Business solutions around the world are supporting ebXML. This work primarily discusses the c作者: 抓住他投降 時間: 2025-3-31 04:08 作者: 工作 時間: 2025-3-31 08:39 作者: 水獺 時間: 2025-3-31 10:53 作者: filicide 時間: 2025-3-31 16:01 作者: 傲慢物 時間: 2025-3-31 20:41
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300066.jpg作者: Aspirin 時間: 2025-4-1 01:01 作者: 無王時期, 時間: 2025-4-1 04:08 作者: 善變 時間: 2025-4-1 06:25
ebIOP: An ebXML Compliant B2B Interoperability Platformrmation Model (ebRIM) to describe a registry/repository that provides a classification mechanism to achieve partner discovery..Currently, there exists many B2B standards each provide competing and complementary solutions to B2B interoperability. So, there is a need for serving implementation of thes作者: 榨取 時間: 2025-4-1 11:22 作者: 連鎖 時間: 2025-4-1 17:09