Be able to process information coming from different sources of client interaction, i.e.: , web, sms, fax,
|
|
- John Wells
- 8 years ago
- Views:
Transcription
1 Secure Intelligent Broker for m-commerce 1. Diego Ponce, Miguel Soriano Abstract-- The great acceptance of mobile telephony in the world market represents an excellent opportunity for electronic commerce. Characteristics of mobile devices with capabilities of WAP (Wireless Application Protocol) and intrinsic properties of wireless environments impose a set of constraints for mobile commerce development presented in this article. At the same time an intelligent broker between mobile clients and servers on Internet is proposed to profit standards and existing technologies to fulfill client needs, manage and personalize client information. Index terms-- WAP, m-commerce, intelligent broker, end to end security I. INTRODUCTION Management in new economy enterprise is built in the network, internally and the relationship with providers and the market. The concept known in the 80's as "new technologies" has originated a "new economy". At the end of 90's, the "e-business" concept appears as a way to understand enterprise adaptation to the digital world. Electronic Commerce could be defined, in a general sense, as any kind of financial transaction or commercial information interchange based on data transmission over communication networks. Economy Analysts point the success of e-commerce proportional to the value added to the supply chain of the product. The use of new technologies eases the provider to offer service after-sales and obtain a useful feedback to trace the product with information from client. Currently there are different technological alternatives for mercantile processes in important aspects as advertising, market investigation, negotiation, payment mechanisms, post-sales service, Massive implementation success, however, must still overcome cultural barriers, improve usability and guarantee user confidence. One of the novelties of e-commerce is the possibility to attract client in the neighborhood of commercial centers and/or service centers by providing them with appropriate information. This paper presents first a series of aspects to keep in mind at the moment of design of an m-commerce scheme. Section 3 proposes the use of a broker based on artificial intelligence mechanisms, the following section show characteristics and constraints of the proposed model. Finally, conclusions of the work are enumerated. II. M-COMMERCE Mobile Commerce involves three basic aspects; business and service delivery in the client neighborhood, timely and geo-referenced information while the user is moving, possibility to complete a transaction immediately. User should have the following facilities: negotiation and immediate delivery, fast methods of micro and macro payment, and usability in the mobile environment [6]. There are, however, a series of factors that difficult the implementation and development of m-commerce related to e-commerce. Those drawbacks are related with the characteristics of wireless environment (normally less bandwidth, lower latency, less stability of connections, less predictable availability) and constraints in the mobile devices (less powerful CPU, less memory, limitations on power consumption, form factor of displays, ). Figure 1 shows typical WAP environment, usually the mobile device connects to Internet through a gateway (WAP proxy) that translates between protocols of Internet and WAP. Department of Telematics Engineering, Polytechnic University of Catalonia. Jordi Girona 1-3. Campus Nord, Mod. C3, UPC Barcelona - Spain. {dponce, soriano}@mat.upc.es. 1 This work has been developed as part of the project ACIMUT CICYT TIC C Figure 1 Typical WAP Environment. In the frame of e-commerce, there exist interesting proposals that integrate emerging technologies in an infrastructure
2 that redefines the way of making business and get access to information on line. The goal is to implement a new infrastructure conceptually better than the Web, kwon as "The Grid" [10]. Mobile market could be used as an extension of B2B (business to business model) for corporation mobile environments. The end client situation is of the B2C (business to Consumer model), free unlimited access to contents in Internet. A way to communicate platforms of B2B with B2C could be using brokers to manage and ease information search and retrieval for the user. Negotiation will require data security. In e-commerce negotiation alternatives and models are of vital importance for the user. User chooses among a set of them according to his own personal and enterprise needs. The security standards at transport and IP level such as TLS (Transport Layer Security) [4] and IP-Sec [24] on Internet, and WTLS (wireless TLS), WIM (Wireless Identity Model), WVPN (Wireless Virtual private network), and bearer ciphering algorithms are also widely deployed [1]. Figure 2 shows Internet and WAP protocol stacks and placement of security layers. and integrity of data at WAP gateway the following is required: 1. Never store data in clear on secondary memory. 2. Use fast cipher and decipher with erasure of contents in clear in volatile internal memory immediately after transaction has been done. 3. Make physically secure the access to the console of WAP gateway to authorized administrator personnel only. 4. Apply all security mechanisms to protect invoice systems and location record at WAP gateway. However, security in WAP environments still present the following weaknesses [5]: It does not provide end to end authentication between Internet Server and Mobile User. Contents of messages are in the clear in the WAP gateway. In [20] an alternative to WAP security architecture is presented to solve the mentioned problems. Security on TCP/IP at the IP layer level is denominated IP- Sec. It allows the implementation of virtual private networks inside Internet. Analogous in WAP is the WVPN wireless virtual private network. III. BROKER Figure 2 Internet and WAP Protocol Stacks. In m-commerce environment both the provider and the client get connected through software entities. Authentication, integrity and confidence relationships must be established [7]. Authentication of messages is reached when the user signs a message with his private key and the receiver deciphers it with the public key, in order to guarantee the authenticity of the keys, PKI (public key infrastructure) is needed. Certification Authorities extend a digital certificate authenticating each party and the message they interchange. Unfortunately, there are not a worldwide public key infrastructure implemented yet and that is the reason why merchants have adopted other solutions. Figure 1 represents the security model in WAP environment. It could be observed that secure channels between client and WAP gateway are supported by WTLS, while the channel between WAP gateway and Internet server is supported by TLS. Translation between WTLS and TLS is executed at the WAP gateway. In order to guarantee privacy An important constraint in WAP environment is the narrow bandwidth available. Reports made by important analysts like Nielsen Group, Jupiter Media Matrix and Yankee Group point the need to provide content by different means like SMS, and WML pages. Rich and fast data delivery is also indispensable [25]. In order to speed up the content delivery with the existing constraints a broker with intelligent mechanisms is proposed. Figure 3 shows a general scheme of the broker that manages the data content interchange between client and server. A search mechanism, intermediate storage, customer relationship management and a user certificate repository are integrated and protected by mean of a security layer.
3 Figure 3 Broker General Scheme Information search is performed using intelligent agent technology. Multi agent systems allow a cooperative behavior between agents for the search and retrieve of information on Internet. Specialized agents search retrieve and classify clusters of information. Information obtained in the search process could be profited by other mobile users so the need of intermediate storage. Successful distributed data bases and proxy and cache mechanisms that consider special characteristics of mobile users (low latency, noise, unpredictable availability, disconnection) are proposed. WAP Push and Pull delivery mechanisms allow two different strategies for information content delivery. Push mechanism allows automated delivery without explicit request. The customer relationship management makes it possible to obtain a personalized user profile that could be profited to filter and delivery content of interest for a specific user. Figure 4 shows the flowchart of a Push content delivery transaction. Pull mechanism based on user request of information could profit intermediate storage and agent assisted search of contents to ease and speed up content delivery. Figure 5 shows the flow diagram for a pull request from WAP user. Figure 4 Push Information Delivery Security is an important concern and its strategy should involve: the network, operating system, database protection, code interchange and data transmission. Administrator personnel access measures must be similar to WAP gateway. Fast delivery of information is also a concern. The wireless channel between the mobile user and the WAP gateway constitutes the bandwidth "bottleneck" for the data transmission. Typical bandwidth over GSM is about 9600 b/s. The broker should be located near this bottleneck at the Internet side to buffer, cache and proxy the traffic to the wireless terminals with a distributed scheme similar to [12].
4 Be able to process information coming from different sources of client interaction, i.e.: , web, sms, fax,. Figure 5 Pull Information Delivery The customer relationship management CRM technology, is very often related to sales force automation. Automated management of user information could make automated service personalization feasible. User profile could be managed and updated dynamically, processing information from different sources. CRM technology for wireless environments improves usability and extends capacity of mobile terminals. Content delivery could be done in a predictive fashion profiting facilities of Push mechanism of WAP. Delivery of contents could be done using SMS, e- mail or WML/Script. Push mechanism implies less occupation of the wireless channel compared to Pull requests (round trip). CRM strategy of implementation in the Broker requires three steps: startup, growth and establishment of the system. Minimum parameter recommendations are: Manage transactions from the Company Web Service. Provide a centralized repository of information of clients. Have enough intelligence and analysis capacity available to capture and convert client data to useful information. Integrate in the workflow all the information and make it available on each step of the process. Work with their own and different operating systems/applications (Portable). Push delivery of information requires generation of distribution lists. Distribution lists are generated using user profile information. Up to date content in Broker storage system must be filtered and delivered to users on each list by means of a batch process. A Client could be user of different lists. Intelligent multi agent systems based on object oriented code also require special attention to the security of its code to guarantee availability and correct operation. Tasks like: search, advice, contact, compare, filter, facilitate access to data bases are ideal for agent technology deployment. Multiuser environment should also use expert systems in order to manage personalization and content delivery. Agent technology requires from environment the following: accessibility, determinism, predictable static or dynamic environments, and rules of access. Unfortunately Internet is not friendly enough for intelligent agents [23]. Once the broker has connected the mobile terminal with the Internet server, a secure channel can be necessary for negotiation and payment. Broker stops its intervention and an end to end secure tunnel is established. The "wireless extensions for TLS" proposal of IETF [21] could offer a suitable mechanism to provide end to end security, another alternative is [20]. Public key infrastructure is needed to provide authentication and privacy. Broker is suitable to store digital certificates in a repository. Combined with OCSP (On line Certificate Status Protocol) fast information about the status of certificates could be obtained. Hiding complexity for the user need intelligent mechanisms that ease the use and provide additional information like: geographic proximity to a service center, delivery of information organized by zone. Processing information to be presented to the mobile terminal, user profile and personalized relationship management, and anticipated delivery of contents. Knowing user profile we are able to manage user needs of information, delivery information in a predictive fashion and dynamic tracking of clusters of information. IV. CONCLUSIONS Security, fast delivery of data content and customer relationship management are key elements for WAP success in wireless telephony environment.
5 Intrinsic characteristic and constraints of wireless environments make suitable the use of broker extending capacity of wireless terminals and improve delivery of information. Usability is also an important issue so the need to assist the user, ease the use and make it comfortable for the user in crowd, noisy, mobile environment. Secure end to end channel for electronic commerce transactions between mobile terminal and Internet server are also desirable. However, security must cover also the different mechanisms involved and protect the user data and code of the broker itself. Portability and connectivity among different platforms in a distributed scenario is very important. Object technology, Java and CORBA. Distributed data base design tuned for mobile users and scalability are needed. Integration between WWW and WAP reuse of application components and flexibility are also needed. V. REFERENCES [1] WapForum, Wap 1.2 Specification, (Jun. 2000), http.// [2] M. Rader, U. Riehm, Payments by mobile phone more convinient than e-wallets?, ITAS, Karlruhe, Germany. [3] J.H. Saltzer, D.P. Reed, D.D. Clark, End to end Arguments in System Design, ACM Transactions in Computer Systems 2.4, (Nov. 1984), pp , [4] T.Dierks, C..Allen, The TLS Protocol version 1.0, (Jan. 1999), Internet Standard RFC [5] R. Khare, W* Effect Considered Harmful, IEEE Internet Computing, (Jul.-Aug. 1999), [6] A. Fasbender, F. Reichert, Any Network, Any Terminal, Anywhere, IEEE Personal Communications. (Apr. 1999), pp [7] D. Van Thanh, Security issues in Mobile e-commerce, IEEE, ISBN , (Aug. 2000). [8] S. Halevi, H. Krawczyk, Public-Key Cryptography and Password Protocols, ACM Transactions on Information and System Security, Vol 2, No 3, (Aug. 1999), pp [9] Durlacher Research Ltd., Mobile Commerce Report, [10] K. Westhead, et al. New Economy, Forget the Web make way for the grid. Deustche bank, (Jun. 2000). [11] Y. Malhotra, Knowledge Management for e-business performance: Advancing Information Strategy to "Internet Time", CRC Press, (2000). [12] T. Sau Loon, V. Barghavan, Alleviating the latency and bandwidth problems in WWW Browsing, (Dec. 1997), [13] B. Pfitzmann, M. Waidner, Properties of Payment Systems: General Definition Sketch and Classification, IBM Research Division, (May. 1996). [14] Sun microsystems, The Java 2 Platform Micro Edition J2ME for Linux, (Jan. 2001), [15] Qualcomm, Binary Run-time Environment for Wireless BREW, (Feb. 2001) [16] R. H. Guttman, et al., Agent Mediated Electronic Commerce: A Survey, Software Agents Group MIT Media Laboratory, [17] B. Venners, Under the hood: The architecture of aglets, Javaworld, (Apr. 1997), hood.html. [18] M. B. Blake, KOJAC: Implementing KQML with Jini to Support Agent-Based Communication in Emarkets, American Association for Artificial Intelligence. (2000). [19] M. Cannataro, D. Pascuzzi, An Object-Based Architecture for WAP-Compliant Applications, IEEE, ISBN , (Aug. 2000). [20] D. Ponce, M. Soriano, P. Mur, A proposal for B2C Electronic Commerce Scheme based on WAP, World Multiconference on Systemics, Cybernetics and Informatics, SCI (Jul 2000). [21] M. Raynal, M. Singhal, Logical Time:Capturing Causality in Distributed Systems, IEEE Computer Magazine, (Feb 1996), pp [22] Phone.com, Understanding Security on the Wireless Internet. (Jan. 2000). [23] M. Wooldridge, N. R. Jennings. Pitfalls of Agent- Oriented Development. University of London. [24] S. Kent, R. Atkinson, Security Architecture for the Internet Protocol. Request for Comments (Nov. 1998). [25] Nielsen Norman Group, WAP Usability Report: Field Study Fall (Dec. 2000). [26] S. Blake, Magnus Nystrom, Wireless Extensions to TLS, draft-ietf-tls-wireless-00.txt, (Nov. 2000).
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract
More informationResearch on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
More informationConsiderations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
More informationArchitecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
More informationOutline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]
Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within
More informationELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
More informationSmartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
More informationLectures for the course: Electronic Commerce Technology (IT 60104)
Lectures for the course: Electronic Commerce Technology (IT 60104) Week 1 Lecture 1 30/12/2010 Introduction to the course Evaluation guidelines Week 2 Lecture 2 3/01/2011 Overview of E-Commerce E-Commerce
More informationMOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
More informationA Comparison of Secure Mechanisms for Mobile Commerce
A Comparison of Secure Mechanisms for Mobile Commerce Hann-Jang Ho 1 and RongJou Yang 2 1 Department of Computer Science and Information Engineering 2 Department of Information Management WuFeng Institute
More informationResearch on Mobile E-business Security Model based on WPKI Technology and its Application
, pp.119-128 http://dx.doi.org/10.14257/ijsia.2015.9.7.11 Research on Mobile E-business Security Model based on WPKI Technology and its Application Yongsheng Luo Department of Electronic and Information
More informationETSI TR 102 071 V1.2.1 (2002-10)
TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,
More informationA Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
More informationA Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
More informationIntegrating notification services in computer network and mobile telephony
Integrating notification services in computer network and mobile telephony Vittorio Ghini Dipartimento di Scienze dell Informazione Università di Bologna Via Mura A. Zamboni 7 40134 Bologna, Italy Phone.
More informationHeterogeneous network establishment assisted by cellular operators
Heterogeneous network establishment assisted by cellular operators Marc Danzeisen (1)(2), Torsten Braun (1), Daniel Rodellar (2), Simon Winiker (1)(2) (1) University of Bern, Computer Networks and Distributed
More informationThe Mobile Electronic Signature Consortium
The Mobile Electronic Signature Consortium For 2001 revenues of more than USD 6.4 billion are predicted for the e-commerce sector. (Forrester Research) At present there are approximately 117 million mobile
More informationCornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
More informationGuide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
More informationHow In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time
SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first
More informationInter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless
More informationModeling and Design of Intelligent Agent System
International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,
More informationA Pluggable Security Framework for Message Oriented Middleware
A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.
More informationMeasuring IP Performance. Geoff Huston Telstra
Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour
More informationE-BANKING DEVELOPING FUTURE WITH ADVANCED TECH- NOLOGIES
154 Proceedings of the Second International Conference on Informatics and Information Technology E-BANKING DEVELOPING FUTURE WITH ADVANCED TECH- NOLOGIES Lj. Antovski, M. Gušev Institute of Informatics,
More informationDetailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
More information10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
More informationGPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationA Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
More informationi. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis
ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information
More informationIntelligent Content Delivery Network (CDN) The New Generation of High-Quality Network
White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming
More informationWireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
More informationE-Business Technologies for the Future
E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview
More informationLOAD BALANCING AS A STRATEGY LEARNING TASK
LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT
More informationA Middleware-Based Approach to Mobile Web Services
Abstract A Middleware-Based Approach to Mobile Web Services Pampa Sadhukhan, Pradip K Das, Rijurekha Sen, Niladrish Chatterjee and Arijit Das Centre for Mobile Computing and Communication (CMCC), Jadavpur
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationA Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
More informationFlexible Architecture for Internet of Things Utilizing an Local Manager
, pp.235-248 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.24 Flexible Architecture for Internet of Things Utilizing an Local Manager Patrik Huss, Niklas Wigertz, Jingcheng Zhang, Allan Huynh, Qinzhong Ye
More informationWIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
More informationRTEs Must Anticipate New Network Demands
Strategic Planning, W. Clark Research Note 13 March 2003 RTEs Must Anticipate New Network Demands Real-time enterprise requirements will change key characteristics of network traffic as usage patterns
More informationAA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.
CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
More informationCHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
More informationLiferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition
Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...
More informationThe OpenEapSmartcard platform. Pr Pascal Urien ENST Paris
The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].
More informationE-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.
E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination
More informationLoad balancing as a strategy learning task
Scholarly Journal of Scientific Research and Essay (SJSRE) Vol. 1(2), pp. 30-34, April 2012 Available online at http:// www.scholarly-journals.com/sjsre ISSN 2315-6163 2012 Scholarly-Journals Review Load
More informationMobile Device Management A Functional Overview
Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute
More informationSome Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging
Some Aspects of the Quality of Service Support Used in Multi Agent Systems on Middleware- Based Distributed Messaging Jose-Luis Poza-Luján, Raúl Simarro-Fernández, Juan-Luis Posadas-Yagüe and José-Enrique
More informationChapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
More informationIMPP: A New Instant Messaging Standard and Its Impact on Internet Business
UDC 621.395.74:681.32 IMPP: A New Instant Messaging Standard and Its Impact on Internet Business VYouji Kohda VHiroyasu Sugano VSatoshi Okuyama (Manuscript received June 2, 2000) There are already more
More informationPlanning and Maintaining a Microsoft Windows Server Network Infrastructure
Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security
More informationSecure System Solution and Security Technology
Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly
More informationDESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
More informationBuilding a Systems Infrastructure to Support e- Business
Building a Systems Infrastructure to Support e- Business NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject
More informationSecurity Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/
Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
More informationCitrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
More informationTowards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain
Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,
More informationEnabling Cloud Architecture for Globally Distributed Applications
The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.
More informationFAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
More informationNet Solutions WEB-EDI
Net Solutions WEB-EDI Solution Documentation NET SOLUTIONS PAGE 1 OF 10 Table of Contents 1 INTRODUCTION 3 2 BUSINESS CONTEXT 4 2.1 GENERAL 4 2.2 EDI IMPLEMENTATION DIFFICULTIES 4 2.3 NET SOLUTIONS WEB-EDI
More informationA Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
More informationAutomating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology
Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India adgaonkarbhavana@yahoo.in
More informationMobile Cloud Computing In Business
Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud
More informationEnterprise Application Performance Management: An End-to-End Perspective
SETLabs Briefings VOL 4 NO 2 Oct - Dec 2006 Enterprise Application Performance Management: An End-to-End Perspective By Vishy Narayan With rapidly evolving technology, continued improvements in performance
More informationSecure Architecture for the Digital Rights Management of the M-Content
Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 196 Secure Architecture for the Digital Rights Management of the M-Content ION IVAN,
More informationNETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
More informationA Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationAppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
More informationE-Business Technologies
E-Business Technologies Craig Van Slyke and France Bélanger John Wiley & Sons, Inc. Slides by Fred Niederman 7-1 Client/Server Technologies for E-Business Chapter 7 7-2 Key Ideas E-commerce applications
More informationHitachi s Activities Regarding Broadband IPv6 Network Systems
Hitachi Review Vol. 51 (2002), No. 2 31 Hitachi s Activities Regarding Broadband IPv6 Network Systems Toru Takesue Shiro Tanabe, Ph.D. Shinichi Iwaki OVERVIEW: Based on IPv4 (Internet protocol version
More informationTrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
More informationAndroid Application for Accessing KNX Devices via IP Connection
Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,
More informationThe Sierra Clustered Database Engine, the technology at the heart of
A New Approach: Clustrix Sierra Database Engine The Sierra Clustered Database Engine, the technology at the heart of the Clustrix solution, is a shared-nothing environment that includes the Sierra Parallel
More informationA Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
More informationCellular and 802.11 Networks Application and Data Usage
Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors
More informationJAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
SOFTWARE ENGINEERING TRACK JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
More informationSession Topic:Accelerate Enterprise Application Performance with speed, consistency and scalability
Session Topic:Accelerate Enterprise Application Performance with speed, consistency and scalability Conference Name: 13th Annual International Software Testing Conference (STC 2013) Author Name: Mohan
More informationemontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in
More informationComparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
More informationDeveloping Wireless GIS: Using Java and XML Technologies
Developing Wireless GIS: Using Java and XML Technologies Hossein Mohammadi GIS Dept., Faculty of Geodesy and Geomatics Eng. K.N. Toosi University of Technology Vali_Asr St., Mirdamad Cross, Tehran, Iran,
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationPart III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
More informationAxapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA
MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.
More informationList of Projects in Application
List of Projects in Application S-Logix #9, First Floor, Krishnabai St, Habibullah Road T.Nagar, Chennai-600017 (Opp:HDFC Bank) Ph:28343467 Mobile: 8124001111, 9710999001 E-Mail: slogix.india@gmail.com
More informationMEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied
More informationIBM Tivoli Monitoring for Network Performance
Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination
More informationInformation Broker Agents in Intelligent Websites
Information Broker Agents in Intelligent Websites Catholijn M. Jonker, Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence De Boelelaan 1081a, 1081 HV Amsterdam, The Netherlands
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS Chapter
More informationA Comparative Study of cloud and mcloud Computing
A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu
More informationSCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
More informationAssessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce
Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science
More informationMobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
More informationModular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
More informationSecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates
SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates As enterprises move their applications to the Web and mobile platforms, providing strong security
More informationISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
More informationOpen Source Business Rules Management System Enables Active Decisions
JBoss Enterprise BRMS Open Source Business Rules Management System Enables Active Decisions What is it? JBoss Enterprise BRMS provides an open source business rules management system that enables active
More information