Research on Mobile Agent-based E-Commerce System Framework
|
|
|
- Vivien Marsh
- 9 years ago
- Views:
Transcription
1 440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian , China 1 [email protected], 2 [email protected] ABSTRACT Electronic commerce is one of the most important application areas of mobile agent technology. A secure mobile agent system (SMAS) model is established for e-commerce environment. The SMAS consists of mobile agents and mobile agent server. A security shell module in the mobile agent architecture is responsible for mobile agent protection. Surveillance agent running in the agent server provides the host against attacks from malicious agents. Based on the SMAS, mobile agent-based e-commerce system framework is built up and realized in the end. Keywords: electronic commerce, SMAS, empirical study, mobile agent 1. INTRODUCITON Web-based e-commerce have developed through several phases: browsing static web pages, using mutual web tables, processing B2C commerce, till developing B2B application integration. More than half of the enterprises still rest on the phrases of static web pages and simple e-commerce. Up to present, the main form of e-commerce is B2C, which exhibiting its information through HTML, and many of its processes is launched by manual work. With the emergence of B2B and other more complicated commerce pattern, tradition e-commerce technique pattern could not guarantee for validity and could not complete tasks in time. E-commerce of next generation demands for automatic Web dealing initiated by application, decrease of error easily arisen in manual process, and efficiency. Automatization, intelligentization and integration should be embodied by the e-commerce technique pattern in next generation. More research in collaborative information technique and distributive computing pattern in new generation is the main approach to solve the problem. It will promote the development of collaborative e-commerce system that is the third generation of e-commerce. Due to its connatural advantage, mobile agent is applied in next generation e-commerce as a new technology. Therefore, the primary aim of this paper is to give an architectural model and a framework for implementing mobile agent-based e-commerce system. Intelligent and mobile agents are applied to current e-commerce technology to meet autonomy, intelligence and integrity requirements. For the special requirement of electronic commerce, system security is the one of the most important elements to a successful system. The original idea is to establish a secure mobile agent system (SMAS) firstly, and then to build up the mobile agent-based e-commerce system framework based on the SMAS to ensure transmission security. The remainder of this paper has the following structure: Section 2 gives an introduction to mobile agent firstly, and then establishes a secure mobile agent system model for e-commerce. In the last portion of this section, a mobile agent-based e-commerce system framework is brought forth. A logic verification of the system framework is demonstrated in section 3. Section 4 describes some issues relevant to mobile agent applied in e-commerce. And the section 5 gives a conclusion. 2. MOBILE AGENT-BASED E-COMMERCE 2.1 Mobile Introduction The Object Management Group defines a software agent as a computer program that acts autonomously on behalf of a person or organization [1]. The following properties characterize agents: pro-active (support of the user s work) adaptive (learning the user s preferences or the ability to work on different platforms) autonomous (limited communication with its creator) intelligent (making intelligent decisions) mobile (can actively migrate in networks to different systems and move directly to the local resources, like databases or application servers) Mobile agents are programs that can migrate from host to host in a network, at times and to places of their own choosing. The state of the running program is saved, transported to the new host, and restored, allowing the program to continue where it left off. Lange and Oshima [2] give reasons why to use agents: e.g. improvements in latency and bandwidth of client-server applications and reducing vulnerability to network disconnection. 2.2 Mobile s in E-Commerce Mobile agents are well suited for electronic commerce. A commercial transaction may require real-time access to remote resources such as stock quotes and perhaps even agent-to-agent negotiation. Different agents will have different goals, and will implement and exercise different strategies to accomplish these goals. We envision agents that embody the intentions of their
2 441 creators, and act and negotiate on their behalf. Mobile agent technology is a very appealing solution to this kind of problem. An electronic commerce transaction may be viewed in terms of four different phases [3] : product brokering, merchant brokering, negotiation, payment and delivery. Product brokering consists in the gathering of information about the product that is going to be bought. Merchant brokering involves the evaluation of a set of alternatives in order to make the purchase. Making the decision implies considering all the tradeoffs that the various products offer: price, warranties, delivery time, and others. During the negotiation phase the agent settles the final terms of the commercial transaction. The characteristics of the market directly influence the outline of this phase. In markets where prices and characteristics are fixed, negotiation may not even exist. Finally, in the purchase and delivery phase of the transaction, the agent actually makes the acquisition and delivers the money (or its electronic equivalent) against the goods Secure Mobile System A number of advantages of using mobile code and mobile agent computing paradigms have been proposed [4, 5, 6]. One of the main obstacles to the widespread adoption of mobile agents is the legitimate security concern of system developers, network administrators, and information officers. It has been argued that once the security issues have been resolved and a collection of security mechanisms have been developed to counter the associated risks, then the users of mobile agent technology will be free to develop useful and innovative solutions to existing problems and find a wide array of application areas that will benefit from this technology. Using this collection of security mechanisms to mitigate agent-to-agent, agent-to-platform, and platform-to-agent security risks may, however, introduce performance constraints that could dictate design decisions or negate the benefit of using mobile agents for certain applications. Considering the special security requirements in e-commerce, a secure mobile agent system (SMAS) framework is presented in this paper. SMAS consists of mobile agents and agent server (e.g. agent facilitator). Mobile agent has six modules: security shell, environment interaction module, state denotation module, task execution module, routing policy module and log file. The architecture of mobile agent is shown in figure 1. Exterior Security Shell Interaction State Denotation Task Execution Routing Policy Figure 1 Mobile Architecture Model Log File Security shell is responsible for protecting the agent from attacks of malicious hosts and other agents. The main functions include encrypting and decrypting the whole agent, authorizing the visit host, deploying the different security policy according to the different trusted level of host. interaction module is responsible for the maintenance of communication between agent and exterior environment that includes sensor (apperceive outside environment), message processor (process inter-messages, data communication between agent and environment based on KQML) and reactor (i.e. effector, output the result to outside environment). Task execution module is the execution module of agent, which consists of action execution module and result integration module. According to the security strategy to different methods and data deployed by security shell, task execution module executes corresponding method, and makes integrated analysis of results for its goal. State denotation module is responsible for recording the state of agent, which includes attribute value of agent and the sequence of agent s running environment. This makes agent to run successfully when it is hold up or resumed. s state can also be recorded in fixed interval for its resuming in abnormal circumstance. Routing policy module plans agent s migration route. There are two feasible routing policies, one is fixed routing, and the other is dynamic routing based on formula and catalog services. Log file records every sensitive instruction and manipulation on agent executed by agent platform, it s used for audit afterwards. Log file must be encrypted so that it couldn t be juggled. Mobile agent server (mobile agent service facilitator) is based on agent transfer protocol (ATP), it provides essential EE(execution environment) for agent s migration, execution, and other functions and services such as dispatch, reception, recovery, security management and service transfer. Mobile agent server includes security management, agent executing environment, agent API, agent service environment, communicating API, as shown in figure 2.
3 442 Execution Task Execution Surveillance Security Management API Execution Task Execution Surveillance Communication API is responsible for transmitting mobile agents, data and messages, including network protocol API and API Mobile -based E-Commerce Based on above construction of mobile agent system, this paper brings forth the mobile agent-based e-commerce system framework. Its model is shown in figure 3. Service Communication API Local Resouce Static Mobile Server Resource Database Figure 2 Mobile Server Structure User User Interface Service Center Security management is responsible for the security of agent server and the agent executing on it, it takes authentication, encryption, visit controlling and other measures to protect system security. Static Mobile Server Infomatiom Center Internet Every agent server can process several agent EEs. EE is the resource distributed for every agent by the agent server. It runs agent under the control of security management module. Every EE has two kinds of agents: task execution agent and surveillance agent. Task execution agent runs the program on behalf of agent user. Surveillance agent keeps an eye on the execution situation of the task agent. It can terminate the task agent once there is any unauthorized or illegal operation. API is the unique interface between agent and agent server. It provides many characteristic operations of mobile agent that can be utilized to finish the distributed task for the agent. For instance, agent calls Jump procedure explicitly before migrating to another host. Jump procedure captures the whole state image of the mobile agent and transfers the agent to the destination host. On the destination host, agent server loads the agent to the relevant agent EE and recoveries the agent from the hold point. The primary agent will be terminated on the local host after the agent s state image being captured, transferred and recovered successfully on the destination host. service environment manages lifecycle, event and persistence for agent. Lifecycle management realizes creation, dispatch, migration, reception, storage and termination for mobile agent, event service provides agent communication mechanism for collaboration with other agents or application system, which supplies essential condition for agent collaboration. Persistence service ensures agent execution s persistence through corresponding mechanism, it helps agent to restart accurately when there is system or network disaster before agent reach its destination. Local Resource Figure 3 Mobile -Based E-Commerce System Framework In this system, agent service center provides catalog service, registers mobile agent s basic information, maintains agent s lifecycle, cancels illegal agent in time and provides agent query service. In order to enforce system security, especially for mobile agent protection, agent service center also maintains a table which records the history of host visitation, it gets task accomplish information of agent in visitation from its log files, calculates the host s credit degree, puts the result in the history table and re-calculates it so that mobile agent could optimizes routing strategy. Service center need to provide host service query function in order to help agent affirm the servers on which its task could be accomplished, and choose the best route. Information center is responsible for security control of the whole E-Commerce system, it generates certain inbreak inspection agents, sends them to each sub-system, monitors real time condition of system execution, collects relative information of inbreak event, analyzes inbreak event, traces inbreak route and confirms its beginning. Control center takes corresponding measure when it received inbreak report and analyzed it. Control center is also responsible for downloading patches of application and operation system, upgrading virus-preventing software, after this it dispatches mobile agent to install them on every node in the system. Following is the workflow of system: (1) User submits a request through user interface. (2) Server analyzes the request and creates static agent or mobile agent according to the request of task, then registers the agent s information in agent service
4 443 center. (3) Static agent visits local resource under security control of agent server, completes user s request and returns the result to user. In the meantime, it registers agent s logout information on agent service center. (4) Mobile agent registers its information on agent service center, queries for host service table, returns agent server, works out migration route or plan according to routing strategy. (5) Mobile agent queries the history table of host visiting on agent service center, gets credit degree of host on the route, returns the optimized migration route of agent server. (6) Mobile agent sends out migration request to server, agent server makes agent hung up, encrypted, packed and sends it to destination host. (7) Destination host accepts agent, authenticates each other. (8) Destination host carries out security strategy according to authentication result, assigns limited execution environment for agent, and generates monitor agent to monitor the execution information of mobile agent. (9) Mobile agent carries out different security strategy according to authentication result, executes task under assigned resource. If necessary, it could make alliance with other agents and accomplish the task collaboratively. (10) goes through hosts in routing table and completes its task, collects the results, returns it to user and submits log files to agent service center, registers logout information. 3. VERIFICATION At present, many technology research and system development based on agent have been gotten along at home and aboard. However there is little research on agent system verification. Yanxiang He and Xinmeng Chen introduced an agent-mediated system verification method in 2001 [11]. The definition of agent-mediated system verification can be described as follow: a system contains one or more claimed agent(s), it will be changed when some other claimed agent(s) add(s) to the system. That means: (a) System behavior transformation doesn t indicate other process s running slows down the system processing speed. Otherwise it shows the claimed agents apperceive each other to a degree, and they adjust their actions accordingly. (b) New added agent must have the same style with the claimed agents, viz., although it has different goal, knowledge and belief, it should have the same architecture and function. (c) The existing agents and the new added agent don t always communicate with each other, and they not always be autonomous, persistent or intelligent. According to the definition, following test should be done. We suppose X have two instances. If the behavior when there is another instance to exist of each instance and its behavior while there are no other instances to exist are different, that indicates X is an agent. On the contrary X is not an agent. The verification has nothing to do with agent s mobility. For example, a user submits a purchase requirement, two instances of information collection agent, agent1 and agent2, are created. 1 and agent2 move in the network according to their migration route and collect the required commodity information. Each agent apperceive environment automatically and make action according to the environment. When one agent s reaction reaches the existence of another agent, they communicate with each other and get the new task result and execution decision by negotiation. Then they regulate their behaviors based on the new strategy. So they are agent on the agent-mediated system verification definition mentioned above. The rest may be deduced by analogy, we can prove that the system established on the framework introduced in section 2 is an agent-based system. This verification method is based on agent s sociability. For security and performance verification of the system, demonstration and simulation verification are needed. 4. RELATED AND FUTURE WORK Security insurance and system reliability are the foundation and key for the popular application of the mobile agent-based e-commerce. In this paper, secure mobile agent architecture is designed for protecting agent from attacks of malicious host and other agents; surveillance agents are added for protecting the host from attacks of malicious agents; XML-PKI technology is provided for encrypting the sensitive data, code and states for transaction security of agent. Disaster recovery technology is applied to buildup system reliability. There are many promising new research on mobile agent technology and its applications in recent years [8,9,10]. However we should see that we must solve some more technology obstacles on our way. The first one is the issue of agent standardization. FIPA and MASIF are working on that and there should be some standards about mobile agent system framework and so on. For agent in e-commerce, it is still in its infancy. The main trend in this area is to attack four problems: negotiation, information discovery, ontology and security. Furthermore, the use of electronic money in conjunction with mobile agent is particularly challenging. The integration of digital payment system into mobile agent-based e-commerce is important to realize the potential e-market. In a word, there are many jobs should be done for the mobile agent-based e-commerce application in the future.
5 CONCLUSION Mobile agent-based e-commerce system framework mentioned above utilizes the virtues of mobile agent technology fully. It can realize the electronic transaction automatically and intelligently. It also can provide the better security protection for effective and convenience business cooperation and collaborative information sharing between enterprises. To realize the system concretely, Java language is adopted to implement the mobile agent for platform independence. Mobile agent communicates in KQML (Knowledge Query and Manipulation Language) with each other and accesses services provided by agent server. Mobile agent server adopts ATP ( Transfer Protocol) to dispatch and receive mobile agents. ACKNOWLEDGEMENT The research work has got a lot of people's help and energetical support. Especially thank professor Yang for his guidance and support. REFERENCES [1] Crystaliz, Inc., General Magic, Inc., GMD Focus, and IBM Coorp, Mobile Facility pecification Technical report, OMG, [2] Danny B. Lange, Mitsuru Oshima, Seven Good Reasons for Mobile s, Communications of the ACM, Vol 42, No. 3, pp88-89, March [3] P. Maes, R. Guttman, and A. Moukas, s that Buy and Sell, Communications of the ACM, vol. 42, [4] Danny Lange, Mitsuru Oshima, Programming and Deploying Java Mobile s with Aglets, Addison-Wesley, [5] Jonathan Smith, A Survey of Process Migration Mechanisms, Operating Systems Review, ACM Special Interest Group on Operating Systems, Vol 22, No. 3, pp28-40, July [6] David Chess, Colin Harrison, and Aaron Kershenbaum, Mobile s: Are They a Good Idea?, IBM Research Report RC (88465), December [7] Christian F, Tschudin, Open resource allocation for mobile code, In Proceedings of The First Workshop on Mobile s, pp , April [8] Birk A, Boosting cooperation by evolving trust, Applied Arti-cial Intelligence, Vol 14, No. 8, pp , [9] Castelfranchi C, Falcone R, Trust and control: dialectic link, Applied Arti-cial Intelligence, Vol 14, No. 8, pp , [10] Zacharia G, Moukas A, and Maes P., Collaborative reputation mechanisms for electronic marketplaces, Decision Support Systems, Vol 29, pp , [11] Yanxiang He, Xinmeng Chen, Design and application of agent and multi-agent system, Wuhan University Press,pp , 2001.
ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Online Trading and Negotiation
Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: [email protected] URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
A Satellite Network Management Architecture based on Mobile Agents and SNMP
2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire [email protected] 25th
irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire [email protected] Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...
A Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Table of Contents. 2015 Cicero, Inc. All rights protected and reserved.
Desktop Analytics Table of Contents Contact Center and Back Office Activity Intelligence... 3 Cicero Discovery Sensors... 3 Business Data Sensor... 5 Business Process Sensor... 5 System Sensor... 6 Session
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
GenericServ, a Generic Server for Web Application Development
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student [email protected] Bilal CHEBARO Assistant professor [email protected] Abstract
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Master of Science in Software Engineering Student Guide
King Fahd University of Petroleum & Minerals College of Computer Sciences and Engineering Information and Computer Science Department Master of Science in Software Engineering Student Guide http://www.ccse.kfupm.edu.sa/swe/
How To Secure Cloud Computing
Resilient Cloud Services By Hemayamini Kurra, Glynis Dsouza, Youssif Al Nasshif, Salim Hariri University of Arizona First Franco-American Workshop on Cybersecurity 18 th October, 2013 Presentation Outline
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
Modern Accounting Information System Security (AISS) Research Based on IT Technology
, pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Development of a personal agenda and a distributed meeting scheduler based on JADE agents
Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad
IBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz [email protected] IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
Alliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Agents and Web Services
Agents and Web Services ------SENG609.22 Tutorial 1 Dong Liu Abstract: The basics of web services are reviewed in this tutorial. Agents are compared to web services in many aspects, and the impacts of
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Managed File Transfer in Enterprise Java Applications
Managed File Transfer in Enterprise Java Applications By David Sims Flux I: Why Should You Care About Managed File Transfer? In an SOA world, bulk data transfer occurs largely by way of file transfer.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4
5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide
NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide September 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
The Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
Four keys to effectively monitor and control secure file transfer
Four keys to effectively monitor and control secure file transfer Contents: 1 Executive summary 2 Key #1 Make your data visible wherever it is in the network 2 Key #2 Reduce or even eliminate ad hoc use
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Module 6. e-business and e- Commerce
Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements
Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency
WHITE PAPER SERVICES Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency Brocade monitoring service delivers business intelligence to help IT organizations meet SLAs,
HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer
Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
E-business Management System Based on Coordinated Center for Dealer
The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 533 E-business Based on Coordinated Center for Dealer Ding Zhang 1, Jingwen An 1, Zhongqing Cheng 2 1 School of Management,
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
HP 3PAR Software Installation and Startup Service
Technical data HP 3PAR Software Installation and Startup Service HP Care Pack Services For smooth startup, HP 3PAR Software Installation and Startup Service provides deployment of your HP 3PAR software,
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents
A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a
4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 2015) The Research on Industrial Information Monitoring System Based on B/S Structure Xuexuan ZHU1, a 1 College of Electrical
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
RESEARCH ON AGRICULTURAL E- COMMERCE PUBLIC TRADE PLATFORM SYSTEM
RESEARCH ON AGRICULTURAL E- COMMERCE PUBLIC TRADE PLATFORM SYSTEM Qifeng Yang 1,*, Bin Feng 1, Ping Song 1 1 Economics College of Wuhan University of Technology Wuhan, Hubei, 430070 P.R.CHINA * Corresponding
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Why you need an Automated Asset Management Solution
solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery
On-line Payment and Security of E-commerce
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
Achieve greater efficiency in asset management by managing all your asset types on a single platform.
Asset solutions To support your business objectives Achieve greater efficiency in asset by managing all your asset types on a single platform. When you use Maximo Asset Management to help maximize the
STERLING COMMERCE WHITE PAPER. Four Keys to Effectively Monitor and Control Secure File Transfer
STERLING COMMERCE WHITE PAPER Four Keys to Effectively Monitor and Control Secure File Transfer 2 As more information is digitized and more business data is considered critical, you re spending far more
The Study on Web GIS Architecture Based on JNLP
ISPRS SIPT IGU UCI CIG ACSG Table of contents Table des matières Authors index Index des auteurs Search Recherches Exit Sortir The Study on Web GIS Architecture Based on JNLP Li Luqun 1, Li Jian 2,Tian
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits
Personalized e-learning a Goal Oriented Approach
Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
