首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Abstract

The Internet is firmly established as a primary method of communications. Documents and information can be sent online in a matter of seconds, reliably and confidentially. Email addresses have joined telephone numbers and street addresses as acceptable methods of identification and communications. Organizations and individuals throughout the world negotiate contracts, make major purchases and transact business without any exchange of papers.  相似文献   

2.
3.
Security is key to E-commerce (or E-business). Customers of E-commerce need the confidence that their online transactions are secure and that, if something goes wrong, they have some sort of redress for loss or damage. This growing need for assurance demands not only a set of security tools but also a legal framework in which to apply these tools. This includes the need to use cryptographic techniques and, in particular, ‘electronic signatures’ and related services allowing data authentication and certification. Electronic signatures enable someone receiving data over the Internet for example, to determine the origin of the data and to check that the data has not been altered.  相似文献   

4.
US company NTRU Cryptosystems Inc. has announced the availability of the Tumbler software toolkit implementing NTRU. NTRU delivers encryption, decryption, authentication and digital signature features at speeds over 100 times faster than alternative systems. Jim Kotanchik, NTRU Vice President of Engineering states: “Prior to NTRU, users had to accept slow operation or make security compromises. NTRU allows the highest security levels at speeds two orders of magnitude faster than competitive systems, eliminating the need to compromise either speed or security.” The product is suitable for applications where high performance, high security and low power consumption are required, such as wireless data communications, Internet music and video distribution, micropayments, E-commerce and embedded devices.  相似文献   

5.
It is likely that customers issue requests based on out-of-date information in e-commerce application systems. Hence, the transaction failure rates would increase greatly. In this paper, we present a preference update model to address this problem. A preference update is an extended SQL update statement where a user can request the desired number of target data items by specifying multiple preferences. Moreover, the preference update allows easy extraction of criteria from a set of concurrent requests and, hence, optimal decisions for the data assignments can be made. We propose a group evaluation strategy for preference update processing in a multidatabase environment. The experimental results show that the group evaluation can effectively increase the customer satisfaction level with acceptable cost. Peng Li is the Chief Software Architect of didiom LLC. Before that, he was a visiting assistant professor of computer science department in Western Kentucky University. He received his Ph.D. degree of computer science from the University of Texas at Dallas. He also holds a B.Sc. and M.S. in Computer Science from the Renmin University of China. His research interests include database systems, database security, transaction processing, distributed and Internet computer and E-commerce. Manghui Tu received a Bachelor degree of Science from Wuhan University, P.R. China in 1996, and a Master Degree in Computer Science from the University of Texas at Dallas 2001. He is currently working toward the PhD degree in the Department of Computer Science at the University of Texas at Dallas. Mr. Tu’s research interests include distributed systems, grid computing, information security, mobile computing, and scientific computing. His PhD research work focus on the data management in secure and high performance data grid. He is a student member of the IEEE. I-Ling Yen received her BS degree from Tsing-Hua University, Taiwan, and her MS and PhD degrees in Computer Science from the University of Houston. She is currently an Associate Professor of Computer Science at the University of Texas at Dallas. Dr. Yen’s research interests include fault-tolerant computing, security systems and algorithms, distributed systems, Internet technologies, E-commerce, and self-stabilizing systems. She had published over 100 technical papers in these research areas and received many research awards from NSF, DOD, NASA, and several industry companies. She has served as Program Committee member for many conferences and Program Chair/Co-Chair for the IEEE Symposium on Application-Specific Software and System Engineering & Technology, IEEE High Assurance Systems Engineering Symposium, IEEE International Computer Software and Applications Conference, and IEEE International Symposium on Autonomous Decentralized Systems. She is a member of the IEEE. Zhonghang Xia received the B.S. degree in applied mathematics from Dalian University of Technology in 1990, the M.S. degree in Operations Research from Qufu Normal University in 1993, and the Ph.D. degree in computer science from the University of Texas at Dallas in 2004. He is now an assistant professor in the Department of Computer Science, Western Kentucky University, Bowling Green, KY. His research interests are in the area of multimedia computing and networking, distributed systems, and data mining.  相似文献   

6.
基于Java中间件技术的电子商务的应用研究和实现   总被引:2,自引:0,他引:2  
林鹉  韩国强 《计算机工程》2002,28(11):234-236
采用中间件技术可以更好地满足Internet环境中分布式应用的需求, 建立电子商务的应用框架,该文描述了Java中间件技术及其在九运会电子商务中的应用。  相似文献   

7.
8.
李玮  侯整风 《微机发展》2006,16(12):224-226
近年来,随着对Internet上传输数据保密性的需要,安全套接字层(SSL)被广泛地使用。SSL协议基于公开密钥技术,提供了一种保护客户端/服务器通信安全的机制。但是,SSL协议仍存在一些安全缺陷,对使用SSL协议的通信带来安全隐患。文中简要介绍了SSL 3.0协议的内容,重点讨论了SSL 3.0协议的安全缺陷并针对缺陷提出了相应的改进方法,为协议的实现提供了参考。  相似文献   

9.
BackgroundGlobally, it is agreed that the internet can serve as a tool that enhances well-being but there is no consensus regarding what constitutes problematic internet use and internet use relationship with offline behavioural addictions. This study was conducted to investigate the prevalence of Internet addiction (IA) among adolescents and to determine whether it is a distinct disorder from offline behavioural addictions.MethodsUsing survey design, a total of 1022 University adolescents comprising undergraduates and postgraduates were selected using stratified random sampling. Data were collected using the Revised Internet Addiction Test (RIAT), a questionnaire made up of EPQR-S Lie Scale, Internet Addiction Test (IAT), Internet Use Reasons, Hypersexual Behaviour Inventory and Problem Video Game Playing Scale.ResultsThere was prevalence of IA among the adolescents; the prevalence rate was 3.3%, in a male to female ratio of approximately 3:1. Adolescents’ online addiction was mainly influenced by extrinsic reasons for internet use, although there were few whose reasons for going online were mainly intrinsic. Using the internet to communicate on important matters, getting sex-oriented materials, and making money (especially amongst females) seemed to dominate addicts’ minds; thus, majority were ‘addicts on the internet’ and not ‘addicts to the internet’.ConclusionsOffline behavioural addictions was not an IA causal factor but rather a motivating factor, while intrinsic reasons for internet use was not found to be a reliable factor for distinguishing addicts from non-addicts.  相似文献   

10.
ABSTRACT

This column takes a look at Web sites specifically for use by children and young adults. Sites from ALA, the Internet Public Library, the Librarians' Index to the Internet, and Yahooliganst are evaluated. The inclusion of information on sexual topics within these sites is also discussed.  相似文献   

11.
在开放的Internet环境下安全、完整、有效地传输数据是电子商务发展的关键。首先对电子商务安全性需求和安全性协议进行了阐述,然后针对PKI协议,提出了一种电子商务安全支付方案,为电子商务安全支付提供了保障。  相似文献   

12.
Internet of Things (IoT) is a technology in which for any object the ability to send data via communications networks is provided. Ensuring the security of Internet services and applications is an important factor in attracting users to use this platform. In the other words, if people are unable to trust that the equipment and information will be reasonably safe against damage, abuse and the other security threats, this lack of trust leads to a reduction in the use of IoT-based applications. Recently, Tewari and Gupta (J Supercomput 1–18, 2016) have proposed an ultralightweight RFID authentication protocol to provide desired security for objects in IoT. In this paper, we consider the security of the proposed protocol and present a passive secret disclosure attack against it. The success probability of the attack is ‘1’ while the complexity of the attack is only eavesdropping one session of the protocol. The presented attack has negligible complexity. We verify the correctness of the presented attack by simulation.  相似文献   

13.
ABSTRACT

Federated searching options are offered by academic libraries as a way to simplify using varied electronic resources while simulating a popular Internet search engine. While search results may satisfy the novice user, more senior, sophisticated researchers often prefer using the proprietary, native interfaces of the specific resource. This study investigates one university's encounter with a federated search portal and analyzes usage and effectiveness through vendor-provided data. Statistical reports indicate patron use despite the lack of promotion and instruction, no significant differences in completion of searches between access methods, and the distribution of access methods for freely available Internet resources. Avenues for further research are also presented.  相似文献   

14.
随着网络的普及,XML在电子商务和数据交换中扮演了越来越重要的角色,而PHP则一直在动态网页的设计中得到广泛应用,两者的结合具有重要的意义。该文通过对PHP语言的XML解析器的使用与编写XML操作类的两种方式进行论述,给出了在PHP中运用XML的解决途径。  相似文献   

15.
Abstract

Time has always been a major factor in the way information professionals provide information and function on a daily basis. There always seems to be more things to do or use in the same amount of time. The Internet has added a new twist to the way informa–tion professionals do their jobs and what patrons expect from libraries. The Internet can be used for scholarly and personal information pursuits. Balance is the key for the information professional and the patron. Electronic access does not always mean better. And we have a responsibility to use the Internet in the same way that all sources are used.  相似文献   

16.
The term “Internet technologies” has recently been coined to describe a set of software capabilities aimed at improving data communications and data access in contemporary enterprise information systems. This article presents a framework for implementing Internet technologies to improve enterprisewide data access, particularly in terms of the user interface, communications networking, the application platform, and the hardware operating systems platform. Examples of software products are given to illustrate how Internet technologies affect these platforms.  相似文献   

17.
Web Services在中小型企业电子商务上的应用   总被引:7,自引:6,他引:7  
随着Internet的迅速发展,WebServices技术正逐渐成为新一代电子商务发展的核心。通过使用WebServices,现代电子商务可以帮助个人或企业从Internet上收集到更多的信息。本文讨论了WebServices的概念、体系架构和标准,着重介绍了WebServices在中小型企业电子商务上的应用,并分别给出企业内部与外部应用的模型,最后结合实例对比说明了WebSer-vices在电子商务上的智能化优势。  相似文献   

18.
Recent studies have described the topologies of various networks including the Internet are categorized as scale-free networks. Scale-free network is extremely vulnerable to node attacks. However, the suitability of the topology of the Internet for communications has not been studied. We investigate whether the current Internet is optimized in both aspects of communication efficiency and attack tolerance. For this, we define three metrics to represent the capabilities of the network, which are Clustering coefficient, Efficiency, and Reachability. As a result, we found that the value of γ, a scaling exponent in power law function representing the degree distribution of a scale-free network, may be reduced in the present Internet. To reduce the value of γ, we propose four strategies for re-organizing a network. However, in real network, we cannot control the user’s preference directly. We use a diffusion model based on social behavior dynamics. Furthermore, we show the characteristics of the re-organized networks, and discuss which strategy is more appropriate for achieving a desired network.  相似文献   

19.
Abstract

For years the perimeter has been the focal point of security technology. What was once routers with access control lists designed to block traffic founded on basic characteristics has evolved into a myriad of sophisticated devices inspecting every detail of communications. However, successful attacks are on the rise, with increasing impact on organizations. Although perimeter technology appears to have evolved significantly, it pales in comparison to the advancements in tactics and tools and the cleverness of today's threats. To add to the malaise, companies are seeking to fully leverage the Internet and new application development strategies in an effort to support the comprehensive information-sharing needs of the business.  相似文献   

20.
Abstract

Clearly, E-commerce is revolutionizing both IT and business. What may not be so evident for IT managers is the direction in which this revolution will take their organizations. This article helps IT managers determine this direction by showing how to develop a road map to chart their organizations' course through the E-revolution.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号