Be able to process information coming from different sources of client interaction, i.e.: , web, sms, fax,

Size: px
Start display at page:

Download "Be able to process information coming from different sources of client interaction, i.e.: e-mail, web, sms, fax,"

Transcription

1 Secure Intelligent Broker for m-commerce 1. Diego Ponce, Miguel Soriano Abstract-- The great acceptance of mobile telephony in the world market represents an excellent opportunity for electronic commerce. Characteristics of mobile devices with capabilities of WAP (Wireless Application Protocol) and intrinsic properties of wireless environments impose a set of constraints for mobile commerce development presented in this article. At the same time an intelligent broker between mobile clients and servers on Internet is proposed to profit standards and existing technologies to fulfill client needs, manage and personalize client information. Index terms-- WAP, m-commerce, intelligent broker, end to end security I. INTRODUCTION Management in new economy enterprise is built in the network, internally and the relationship with providers and the market. The concept known in the 80's as "new technologies" has originated a "new economy". At the end of 90's, the "e-business" concept appears as a way to understand enterprise adaptation to the digital world. Electronic Commerce could be defined, in a general sense, as any kind of financial transaction or commercial information interchange based on data transmission over communication networks. Economy Analysts point the success of e-commerce proportional to the value added to the supply chain of the product. The use of new technologies eases the provider to offer service after-sales and obtain a useful feedback to trace the product with information from client. Currently there are different technological alternatives for mercantile processes in important aspects as advertising, market investigation, negotiation, payment mechanisms, post-sales service, Massive implementation success, however, must still overcome cultural barriers, improve usability and guarantee user confidence. One of the novelties of e-commerce is the possibility to attract client in the neighborhood of commercial centers and/or service centers by providing them with appropriate information. This paper presents first a series of aspects to keep in mind at the moment of design of an m-commerce scheme. Section 3 proposes the use of a broker based on artificial intelligence mechanisms, the following section show characteristics and constraints of the proposed model. Finally, conclusions of the work are enumerated. II. M-COMMERCE Mobile Commerce involves three basic aspects; business and service delivery in the client neighborhood, timely and geo-referenced information while the user is moving, possibility to complete a transaction immediately. User should have the following facilities: negotiation and immediate delivery, fast methods of micro and macro payment, and usability in the mobile environment [6]. There are, however, a series of factors that difficult the implementation and development of m-commerce related to e-commerce. Those drawbacks are related with the characteristics of wireless environment (normally less bandwidth, lower latency, less stability of connections, less predictable availability) and constraints in the mobile devices (less powerful CPU, less memory, limitations on power consumption, form factor of displays, ). Figure 1 shows typical WAP environment, usually the mobile device connects to Internet through a gateway (WAP proxy) that translates between protocols of Internet and WAP. Department of Telematics Engineering, Polytechnic University of Catalonia. Jordi Girona 1-3. Campus Nord, Mod. C3, UPC Barcelona - Spain. {dponce, soriano}@mat.upc.es. 1 This work has been developed as part of the project ACIMUT CICYT TIC C Figure 1 Typical WAP Environment. In the frame of e-commerce, there exist interesting proposals that integrate emerging technologies in an infrastructure

2 that redefines the way of making business and get access to information on line. The goal is to implement a new infrastructure conceptually better than the Web, kwon as "The Grid" [10]. Mobile market could be used as an extension of B2B (business to business model) for corporation mobile environments. The end client situation is of the B2C (business to Consumer model), free unlimited access to contents in Internet. A way to communicate platforms of B2B with B2C could be using brokers to manage and ease information search and retrieval for the user. Negotiation will require data security. In e-commerce negotiation alternatives and models are of vital importance for the user. User chooses among a set of them according to his own personal and enterprise needs. The security standards at transport and IP level such as TLS (Transport Layer Security) [4] and IP-Sec [24] on Internet, and WTLS (wireless TLS), WIM (Wireless Identity Model), WVPN (Wireless Virtual private network), and bearer ciphering algorithms are also widely deployed [1]. Figure 2 shows Internet and WAP protocol stacks and placement of security layers. and integrity of data at WAP gateway the following is required: 1. Never store data in clear on secondary memory. 2. Use fast cipher and decipher with erasure of contents in clear in volatile internal memory immediately after transaction has been done. 3. Make physically secure the access to the console of WAP gateway to authorized administrator personnel only. 4. Apply all security mechanisms to protect invoice systems and location record at WAP gateway. However, security in WAP environments still present the following weaknesses [5]: It does not provide end to end authentication between Internet Server and Mobile User. Contents of messages are in the clear in the WAP gateway. In [20] an alternative to WAP security architecture is presented to solve the mentioned problems. Security on TCP/IP at the IP layer level is denominated IP- Sec. It allows the implementation of virtual private networks inside Internet. Analogous in WAP is the WVPN wireless virtual private network. III. BROKER Figure 2 Internet and WAP Protocol Stacks. In m-commerce environment both the provider and the client get connected through software entities. Authentication, integrity and confidence relationships must be established [7]. Authentication of messages is reached when the user signs a message with his private key and the receiver deciphers it with the public key, in order to guarantee the authenticity of the keys, PKI (public key infrastructure) is needed. Certification Authorities extend a digital certificate authenticating each party and the message they interchange. Unfortunately, there are not a worldwide public key infrastructure implemented yet and that is the reason why merchants have adopted other solutions. Figure 1 represents the security model in WAP environment. It could be observed that secure channels between client and WAP gateway are supported by WTLS, while the channel between WAP gateway and Internet server is supported by TLS. Translation between WTLS and TLS is executed at the WAP gateway. In order to guarantee privacy An important constraint in WAP environment is the narrow bandwidth available. Reports made by important analysts like Nielsen Group, Jupiter Media Matrix and Yankee Group point the need to provide content by different means like SMS, and WML pages. Rich and fast data delivery is also indispensable [25]. In order to speed up the content delivery with the existing constraints a broker with intelligent mechanisms is proposed. Figure 3 shows a general scheme of the broker that manages the data content interchange between client and server. A search mechanism, intermediate storage, customer relationship management and a user certificate repository are integrated and protected by mean of a security layer.

3 Figure 3 Broker General Scheme Information search is performed using intelligent agent technology. Multi agent systems allow a cooperative behavior between agents for the search and retrieve of information on Internet. Specialized agents search retrieve and classify clusters of information. Information obtained in the search process could be profited by other mobile users so the need of intermediate storage. Successful distributed data bases and proxy and cache mechanisms that consider special characteristics of mobile users (low latency, noise, unpredictable availability, disconnection) are proposed. WAP Push and Pull delivery mechanisms allow two different strategies for information content delivery. Push mechanism allows automated delivery without explicit request. The customer relationship management makes it possible to obtain a personalized user profile that could be profited to filter and delivery content of interest for a specific user. Figure 4 shows the flowchart of a Push content delivery transaction. Pull mechanism based on user request of information could profit intermediate storage and agent assisted search of contents to ease and speed up content delivery. Figure 5 shows the flow diagram for a pull request from WAP user. Figure 4 Push Information Delivery Security is an important concern and its strategy should involve: the network, operating system, database protection, code interchange and data transmission. Administrator personnel access measures must be similar to WAP gateway. Fast delivery of information is also a concern. The wireless channel between the mobile user and the WAP gateway constitutes the bandwidth "bottleneck" for the data transmission. Typical bandwidth over GSM is about 9600 b/s. The broker should be located near this bottleneck at the Internet side to buffer, cache and proxy the traffic to the wireless terminals with a distributed scheme similar to [12].

4 Be able to process information coming from different sources of client interaction, i.e.: , web, sms, fax,. Figure 5 Pull Information Delivery The customer relationship management CRM technology, is very often related to sales force automation. Automated management of user information could make automated service personalization feasible. User profile could be managed and updated dynamically, processing information from different sources. CRM technology for wireless environments improves usability and extends capacity of mobile terminals. Content delivery could be done in a predictive fashion profiting facilities of Push mechanism of WAP. Delivery of contents could be done using SMS, e- mail or WML/Script. Push mechanism implies less occupation of the wireless channel compared to Pull requests (round trip). CRM strategy of implementation in the Broker requires three steps: startup, growth and establishment of the system. Minimum parameter recommendations are: Manage transactions from the Company Web Service. Provide a centralized repository of information of clients. Have enough intelligence and analysis capacity available to capture and convert client data to useful information. Integrate in the workflow all the information and make it available on each step of the process. Work with their own and different operating systems/applications (Portable). Push delivery of information requires generation of distribution lists. Distribution lists are generated using user profile information. Up to date content in Broker storage system must be filtered and delivered to users on each list by means of a batch process. A Client could be user of different lists. Intelligent multi agent systems based on object oriented code also require special attention to the security of its code to guarantee availability and correct operation. Tasks like: search, advice, contact, compare, filter, facilitate access to data bases are ideal for agent technology deployment. Multiuser environment should also use expert systems in order to manage personalization and content delivery. Agent technology requires from environment the following: accessibility, determinism, predictable static or dynamic environments, and rules of access. Unfortunately Internet is not friendly enough for intelligent agents [23]. Once the broker has connected the mobile terminal with the Internet server, a secure channel can be necessary for negotiation and payment. Broker stops its intervention and an end to end secure tunnel is established. The "wireless extensions for TLS" proposal of IETF [21] could offer a suitable mechanism to provide end to end security, another alternative is [20]. Public key infrastructure is needed to provide authentication and privacy. Broker is suitable to store digital certificates in a repository. Combined with OCSP (On line Certificate Status Protocol) fast information about the status of certificates could be obtained. Hiding complexity for the user need intelligent mechanisms that ease the use and provide additional information like: geographic proximity to a service center, delivery of information organized by zone. Processing information to be presented to the mobile terminal, user profile and personalized relationship management, and anticipated delivery of contents. Knowing user profile we are able to manage user needs of information, delivery information in a predictive fashion and dynamic tracking of clusters of information. IV. CONCLUSIONS Security, fast delivery of data content and customer relationship management are key elements for WAP success in wireless telephony environment.

5 Intrinsic characteristic and constraints of wireless environments make suitable the use of broker extending capacity of wireless terminals and improve delivery of information. Usability is also an important issue so the need to assist the user, ease the use and make it comfortable for the user in crowd, noisy, mobile environment. Secure end to end channel for electronic commerce transactions between mobile terminal and Internet server are also desirable. However, security must cover also the different mechanisms involved and protect the user data and code of the broker itself. Portability and connectivity among different platforms in a distributed scenario is very important. Object technology, Java and CORBA. Distributed data base design tuned for mobile users and scalability are needed. Integration between WWW and WAP reuse of application components and flexibility are also needed. V. REFERENCES [1] WapForum, Wap 1.2 Specification, (Jun. 2000), http.// [2] M. Rader, U. Riehm, Payments by mobile phone more convinient than e-wallets?, ITAS, Karlruhe, Germany. [3] J.H. Saltzer, D.P. Reed, D.D. Clark, End to end Arguments in System Design, ACM Transactions in Computer Systems 2.4, (Nov. 1984), pp , [4] T.Dierks, C..Allen, The TLS Protocol version 1.0, (Jan. 1999), Internet Standard RFC [5] R. Khare, W* Effect Considered Harmful, IEEE Internet Computing, (Jul.-Aug. 1999), [6] A. Fasbender, F. Reichert, Any Network, Any Terminal, Anywhere, IEEE Personal Communications. (Apr. 1999), pp [7] D. Van Thanh, Security issues in Mobile e-commerce, IEEE, ISBN , (Aug. 2000). [8] S. Halevi, H. Krawczyk, Public-Key Cryptography and Password Protocols, ACM Transactions on Information and System Security, Vol 2, No 3, (Aug. 1999), pp [9] Durlacher Research Ltd., Mobile Commerce Report, [10] K. Westhead, et al. New Economy, Forget the Web make way for the grid. Deustche bank, (Jun. 2000). [11] Y. Malhotra, Knowledge Management for e-business performance: Advancing Information Strategy to "Internet Time", CRC Press, (2000). [12] T. Sau Loon, V. Barghavan, Alleviating the latency and bandwidth problems in WWW Browsing, (Dec. 1997), [13] B. Pfitzmann, M. Waidner, Properties of Payment Systems: General Definition Sketch and Classification, IBM Research Division, (May. 1996). [14] Sun microsystems, The Java 2 Platform Micro Edition J2ME for Linux, (Jan. 2001), [15] Qualcomm, Binary Run-time Environment for Wireless BREW, (Feb. 2001) [16] R. H. Guttman, et al., Agent Mediated Electronic Commerce: A Survey, Software Agents Group MIT Media Laboratory, [17] B. Venners, Under the hood: The architecture of aglets, Javaworld, (Apr. 1997), hood.html. [18] M. B. Blake, KOJAC: Implementing KQML with Jini to Support Agent-Based Communication in Emarkets, American Association for Artificial Intelligence. (2000). [19] M. Cannataro, D. Pascuzzi, An Object-Based Architecture for WAP-Compliant Applications, IEEE, ISBN , (Aug. 2000). [20] D. Ponce, M. Soriano, P. Mur, A proposal for B2C Electronic Commerce Scheme based on WAP, World Multiconference on Systemics, Cybernetics and Informatics, SCI (Jul 2000). [21] M. Raynal, M. Singhal, Logical Time:Capturing Causality in Distributed Systems, IEEE Computer Magazine, (Feb 1996), pp [22] Phone.com, Understanding Security on the Wireless Internet. (Jan. 2000). [23] M. Wooldridge, N. R. Jennings. Pitfalls of Agent- Oriented Development. University of London. [24] S. Kent, R. Atkinson, Security Architecture for the Internet Protocol. Request for Comments (Nov. 1998). [25] Nielsen Norman Group, WAP Usability Report: Field Study Fall (Dec. 2000). [26] S. Blake, Magnus Nystrom, Wireless Extensions to TLS, draft-ietf-tls-wireless-00.txt, (Nov. 2000).

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

Smartcard Web Server Enabler Architecture

Smartcard Web Server Enabler Architecture Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use

More information

Lectures for the course: Electronic Commerce Technology (IT 60104)

Lectures for the course: Electronic Commerce Technology (IT 60104) Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

A Comparison of Secure Mechanisms for Mobile Commerce

A Comparison of Secure Mechanisms for Mobile Commerce A Comparison of Secure Mechanisms for Mobile Commerce Hann-Jang Ho 1 and RongJou Yang 2 1 Department of Computer Science and Information Engineering 2 Department of Information Management WuFeng Institute

More information

Research on Mobile E-business Security Model based on WPKI Technology and its Application

Research on Mobile E-business Security Model based on WPKI Technology and its Application , pp.119-128 http://dx.doi.org/10.14257/ijsia.2015.9.7.11 Research on Mobile E-business Security Model based on WPKI Technology and its Application Yongsheng Luo Department of Electronic and Information

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

A Framework for End-to-End Proactive Network Management

A Framework for End-to-End Proactive Network Management A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu

More information

A Grid Architecture for Manufacturing Database System

A Grid Architecture for Manufacturing Database System Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies

More information

Integrating notification services in computer network and mobile telephony

Integrating notification services in computer network and mobile telephony Integrating notification services in computer network and mobile telephony Vittorio Ghini Dipartimento di Scienze dell Informazione Università di Bologna Via Mura A. Zamboni 7 40134 Bologna, Italy Phone.

More information

Heterogeneous network establishment assisted by cellular operators

Heterogeneous network establishment assisted by cellular operators Heterogeneous network establishment assisted by cellular operators Marc Danzeisen (1)(2), Torsten Braun (1), Daniel Rodellar (2), Simon Winiker (1)(2) (1) University of Bern, Computer Networks and Distributed

More information

The Mobile Electronic Signature Consortium

The Mobile Electronic Signature Consortium The Mobile Electronic Signature Consortium For 2001 revenues of more than USD 6.4 billion are predicted for the e-commerce sector. (Forrester Research) At present there are approximately 117 million mobile

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8 Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain

More information

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time

How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first

More information

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless

More information

Modeling and Design of Intelligent Agent System

Modeling and Design of Intelligent Agent System International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,

More information

A Pluggable Security Framework for Message Oriented Middleware

A Pluggable Security Framework for Message Oriented Middleware A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

E-BANKING DEVELOPING FUTURE WITH ADVANCED TECH- NOLOGIES

E-BANKING DEVELOPING FUTURE WITH ADVANCED TECH- NOLOGIES 154 Proceedings of the Second International Conference on Informatics and Information Technology E-BANKING DEVELOPING FUTURE WITH ADVANCED TECH- NOLOGIES Lj. Antovski, M. Gušev Institute of Informatics,

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

Wireless ATA: A New Data Transport Protocol for Wireless Storage

Wireless ATA: A New Data Transport Protocol for Wireless Storage Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr

More information

E-Business Technologies for the Future

E-Business Technologies for the Future E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

A Middleware-Based Approach to Mobile Web Services

A Middleware-Based Approach to Mobile Web Services Abstract A Middleware-Based Approach to Mobile Web Services Pampa Sadhukhan, Pradip K Das, Rijurekha Sen, Niladrish Chatterjee and Arijit Das Centre for Mobile Computing and Communication (CMCC), Jadavpur

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

Flexible Architecture for Internet of Things Utilizing an Local Manager

Flexible Architecture for Internet of Things Utilizing an Local Manager , pp.235-248 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.24 Flexible Architecture for Internet of Things Utilizing an Local Manager Patrik Huss, Niklas Wigertz, Jingcheng Zhang, Allan Huynh, Qinzhong Ye

More information

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES

WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal

More information

RTEs Must Anticipate New Network Demands

RTEs Must Anticipate New Network Demands Strategic Planning, W. Clark Research Note 13 March 2003 RTEs Must Anticipate New Network Demands Real-time enterprise requirements will change key characteristics of network traffic as usage patterns

More information

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...

More information

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].

More information

E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.

E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones. E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination

More information

Load balancing as a strategy learning task

Load balancing as a strategy learning task Scholarly Journal of Scientific Research and Essay (SJSRE) Vol. 1(2), pp. 30-34, April 2012 Available online at http:// www.scholarly-journals.com/sjsre ISSN 2315-6163 2012 Scholarly-Journals Review Load

More information

Mobile Device Management A Functional Overview

Mobile Device Management A Functional Overview Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute

More information

Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging

Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging Jose-Luis Poza-Luján, Raúl Simarro-Fernández, Juan-Luis Posadas-Yagüe and José-Enrique

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

IMPP: A New Instant Messaging Standard and Its Impact on Internet Business

IMPP: A New Instant Messaging Standard and Its Impact on Internet Business UDC 621.395.74:681.32 IMPP: A New Instant Messaging Standard and Its Impact on Internet Business VYouji Kohda VHiroyasu Sugano VSatoshi Okuyama (Manuscript received June 2, 2000) There are already more

More information

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Planning and Maintaining a Microsoft Windows Server Network Infrastructure Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security

More information

Secure System Solution and Security Technology

Secure System Solution and Security Technology Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly

More information

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER

DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group

More information

Building a Systems Infrastructure to Support e- Business

Building a Systems Infrastructure to Support e- Business Building a Systems Infrastructure to Support e- Business NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Enabling Cloud Architecture for Globally Distributed Applications

Enabling Cloud Architecture for Globally Distributed Applications The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

Net Solutions WEB-EDI

Net Solutions WEB-EDI Net Solutions WEB-EDI Solution Documentation NET SOLUTIONS PAGE 1 OF 10 Table of Contents 1 INTRODUCTION 3 2 BUSINESS CONTEXT 4 2.1 GENERAL 4 2.2 EDI IMPLEMENTATION DIFFICULTIES 4 2.3 NET SOLUTIONS WEB-EDI

More information

A Robust Multimedia Contents Distribution over IP based Mobile Networks

A Robust Multimedia Contents Distribution over IP based Mobile Networks , pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering

More information

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology

Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India adgaonkarbhavana@yahoo.in

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

Enterprise Application Performance Management: An End-to-End Perspective

Enterprise Application Performance Management: An End-to-End Perspective SETLabs Briefings VOL 4 NO 2 Oct - Dec 2006 Enterprise Application Performance Management: An End-to-End Perspective By Vishy Narayan With rapidly evolving technology, continued improvements in performance

More information

Secure Architecture for the Digital Rights Management of the M-Content

Secure Architecture for the Digital Rights Management of the M-Content Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 196 Secure Architecture for the Digital Rights Management of the M-Content ION IVAN,

More information

NETWORK ADMINISTRATION AND SECURITY

NETWORK ADMINISTRATION AND SECURITY NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

AppDirector Load balancing IBM Websphere and AppXcel

AppDirector Load balancing IBM Websphere and AppXcel TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT

More information

E-Business Technologies

E-Business Technologies E-Business Technologies Craig Van Slyke and France Bélanger John Wiley & Sons, Inc. Slides by Fred Niederman 7-1 Client/Server Technologies for E-Business Chapter 7 7-2 Key Ideas E-commerce applications

More information

Hitachi s Activities Regarding Broadband IPv6 Network Systems

Hitachi s Activities Regarding Broadband IPv6 Network Systems Hitachi Review Vol. 51 (2002), No. 2 31 Hitachi s Activities Regarding Broadband IPv6 Network Systems Toru Takesue Shiro Tanabe, Ph.D. Shinichi Iwaki OVERVIEW: Based on IPv4 (Internet protocol version

More information

TrustedX - PKI Authentication. Whitepaper

TrustedX - PKI Authentication. Whitepaper TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...

More information

Android Application for Accessing KNX Devices via IP Connection

Android Application for Accessing KNX Devices via IP Connection Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,

More information

The Sierra Clustered Database Engine, the technology at the heart of

The Sierra Clustered Database Engine, the technology at the heart of A New Approach: Clustrix Sierra Database Engine The Sierra Clustered Database Engine, the technology at the heart of the Clustrix solution, is a shared-nothing environment that includes the Sierra Parallel

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Cellular and 802.11 Networks Application and Data Usage

Cellular and 802.11 Networks Application and Data Usage Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors

More information

JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications SOFTWARE ENGINEERING TRACK JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Session Topic:Accelerate Enterprise Application Performance with speed, consistency and scalability

Session Topic:Accelerate Enterprise Application Performance with speed, consistency and scalability Session Topic:Accelerate Enterprise Application Performance with speed, consistency and scalability Conference Name: 13th Annual International Software Testing Conference (STC 2013) Author Name: Mohan

More information

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in

More information

Comparing Mobile VPN Technologies WHITE PAPER

Comparing Mobile VPN Technologies WHITE PAPER Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable

More information

Developing Wireless GIS: Using Java and XML Technologies

Developing Wireless GIS: Using Java and XML Technologies Developing Wireless GIS: Using Java and XML Technologies Hossein Mohammadi GIS Dept., Faculty of Geodesy and Geomatics Eng. K.N. Toosi University of Technology Vali_Asr St., Mirdamad Cross, Tehran, Iran,

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures

More information

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.

More information

List of Projects in Application

List of Projects in Application List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

IBM Tivoli Monitoring for Network Performance

IBM Tivoli Monitoring for Network Performance Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination

More information

Information Broker Agents in Intelligent Websites

Information Broker Agents in Intelligent Websites Information Broker Agents in Intelligent Websites Catholijn M. Jonker, Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS Chapter

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

Modular Communication Infrastructure Design with Quality of Service

Modular Communication Infrastructure Design with Quality of Service Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute

More information

SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates

SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates As enterprises move their applications to the Web and mobile platforms, providing strong security

More information

ISM/ISC Middleware Module

ISM/ISC Middleware Module ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why

More information

Open Source Business Rules Management System Enables Active Decisions

Open Source Business Rules Management System Enables Active Decisions JBoss Enterprise BRMS Open Source Business Rules Management System Enables Active Decisions What is it? JBoss Enterprise BRMS provides an open source business rules management system that enables active

More information