Architecture for a Component-based, Plug-in Micropayment
|
|
|
- Loraine Clark
- 9 years ago
- Views:
Transcription
1 In Proceedings of 5th Asia-Pacific Web Conference, September , Xi an, China, Springer LNCS 2642, pp Architecture for a Component-based, Plug-in Micropayment System Xiaoling Dai 1 and John Grundy 1, 2 Department of Computer Science 1 and Department of Electrical and Electronic Engineering 2 University of Auckland, Private Bag 92019, Auckland, New Zealand {xdai001, john-g}@cs.auckland.ac.nz Abstract. Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of webbased applications. However, adding micro-payment support to web-sites is usually time-consuming and intrusive, both to the web site s software architecture and its user interface implementation. We describe a plug-in, component model for adding micro-payment support to web applications. We use J2EE software components to encapsulate micro-payment E-coin debiting and redemption and discrete user interface enhancement. A infrastructure is used to inter-connect J2EE and non-j2ee vendors and micro-payment brokers. We demonstrate the feasibility of our approach with an on-line, pay-as-you-use journal portal example and outline an approach to using web services to further generalize our architecture. 1 Introduction Many current e-commerce systems adopt a macro-payment model and architecture [16], [17], [18]. A customer makes a small number of purchases which have a reasonably high cost per purchase. In order to pay for purchases, a heavy weight interaction between the vendor of the product or service and an authorisation agent (bank, credit-card company etc) system is carried out. This typically involves the customer supplying credit card details or digital money certificates, which are communicated to the authorisation system using complex encryption algorithms. Business processing logic and database updates are performed by the authoriser before the purchase is approved. The vendor system waits for approval before providing the customer with goods or services. This approach works well for relatively small numbers of transactions and relatively high purchase price (to offset the cost of authorisation) [3]. In some e-commerce scenarios this approach has a number of fundamental flaws. It requires the authorisation system to always be on-line. High numbers of transactions or low-price purchase items are infeasible, due to bottle- necking or prohibitive cost pertransaction. In addition, with some approaches the customer s identity can not gener-
2 ally be hidden from the vendor and customers are charged for products, services or information even if they don t use them [3]. We describe the NetPay micro-payment model and a component-based software architecture that we have been developing for NetPay. NetPay provides an off-line micro-payment model using light-weight hashing-based encryption. A customer buys a collection of E-coins using a macro-payment from a broker. These coins are cached in an E-wallet on the customer s machine. The customer, when buying many smallcost items from a vendor, pays for these transparently by the passing of E-coin information to the vendor. Periodically the vendor redeems the E-coins with the broker for real money. E-coins can be transparently exchanged between vendors when the customer moves to another site. In previous work we have described the hard-coding of NetPay support into web-based applications, an approach used by most macro- and micro-payment solutions [4]. Major disadvantages of such an approach is the difficulty and time to add micro-payment support to existing applications, the mis-match of implementation technologies and application services if trying to reuse code, and potential design and software architecture mis-matches. We describe a new component-based approach for encapsulating micro-payment support for web-based applications - vendors of products, services or information to be purchased by micro-payment. We use an example web-based application, an E- journal portal system, that we have developed independently for a teaching project and then have enhanced by adding NetPay components via J2EE Enterprise JavaBean components and Java Server Page proxies. These reusable NetPay components are plugged into the existing journal site to enhance it with micro-payment support with minimal or no code changes. We describe our approach s architecture and design and we illustrate the E-journal interface after plugging in these components. We discuss related work, the advantages and disadvantages of our approach and outline possibilities for further research. 2 Example Application Domain On-line journals have become popular and are usually paid for on a macro-payment, subscription basis. Using subscription-based payment, a customer first has to subscribe to the journal by supplying payment details (credit card etc) and the journal system would make an electronic debit to pay for their subscription by communicating with an authorisation server. The customer would then normally go to the journal s site where they login with an assigned customer name and password. The journal looks up their details and provides them access to editions of various journals if their subscription is still current. The E-journal site may provide a range of journals for a specific publisher or act as a portal for multiple publishers, paying each on a persubscription or per-usage basis. If the customer s subscription to a particular journal has run out, they must renew this by authorising a payment from their credit card. Fig. 1 (a) outlines some of the key interaction use cases for this scenario. Problems with this approach are that there is no anonymity for the customer (the journal system knows exactly who they are and when and what they read), they can not move to other sites without first
3 subscribing to them too, and they must pay for the whole journal (often very expensive), even if they want just one or two sections or articles. These issues apply to many other information sources on the internet where vendors want to charge for a variety of information content [1], [7]. Subscribe Make Macropayment Get E-coins Broker Customer Read Article Authorisation System Customer <<uses>> Read Article Debit Coin Redeem Debit (a) Typical macro-payment interaction model. (b) Possible micro-payment interaction model. Fig. 1. Two on-line newspaper interaction scenarios An alternative approach is a micro-payment model. There are several approaches to micro-payment [5], [6], [8], [9], [10]. We outline the basic interactions of our Net- Pay model [2]. Fig. 1 (b) outlines the key interaction use cases for this scenario. The customer first goes to a broker and purchases E-coins using a single macropayment. These are stored in an E-wallet on the customer s machine. The customer can then visit any journal site or newspaper site or music site they wish, their wallet giving the site an E-coin. Each time they view an article (or section or page, depending on the item charged for) or download a song their E-coin is debited. The vendor redeems debits with the broker (for real money ) periodically e.g. each night/week. The customer can move to another site and unspent money associated with their E- coin is transferred from the first vendor to the second. If E-coins run out, the customer communicates with the broker and authorises another macro-payment debit. The standard macro-payment methods cannot be effectively or efficiently applied for buying inexpensive information goods, like single articles of an on-line journal, because transaction costs are too high. Encryption mechanisms used are slow and each transaction typically costs a few cents. Macro-payment suits spending small numbers of large amounts. An Internet micro-payment system allows spending large numbers of small amounts of money at web sites in exchange for various content or services, as in the E-journal scenario above. The design of micro-payment systems is usually quite different from existing macro-payment systems, since micro-payment systems must be very simple, secure, and efficient, with a very low cost per transaction. The rapid growth of the Internet has led to the appearance of thousands of different web sites, which are created to provide information to millions of people around the world. Producing and maintaining a quality web site takes a great deal of time, dedication and money. To help offset the development costs, web site producers are keen to use their site as a source of income. Therefore, an efficient micro-payment system whose components can be plugged into the existing sites to handle such a trade is needed. Such a micro-payment system would ideally be easily reusable i.e. not require extensive redevelopment to integrate with the web application s architecture; not require any modification to the web application itself; provide effective and efficient
4 debiting of customer E-coins and redemption of these coins via a broker for real money; and integrate seamlessly with both the architecture and user interfaces of the web application. In our E-journal example, the journal provider would want to charge small amounts on a per-article basis (perhaps varying amounts) and have this micropayment support integrated seamlessly and with minimum effort with their existing web application architecture. 3 An Overview of NetPay A new micro-payment protocol called NetPay allows customers (e.g. journal readers) to purchase information from vendors (e.g. on-line E-journal) using E-coins on the WWW [2]. A broker provides a source for E-coin purchase and vendor redemption of E-coins for real money. NetPay is intended to provide a secure, cheap, widely available, and debit-based protocol for micro-payment applications. NetPay differs from previous micro-payment protocols in the following ways: NetPay uses touchstones signed by the broker and E-coin indexes signed by vendors which are passed from vendor to vendor. Open Account Broker Payment for E-coins Customer Buy E-coins Payment for Redeeming Coins Bank Store E-coins in e-wallet Get Touchstone <<uses>> Redeem E-coins Access a site <<uses>> Vendor 1 Visit Other site Debit E-coin Request Touchstone Vendor 2 Fig. 2. Basic NetPay component interactions The signed touchstone is used by a vendor to verify the electronic currency the paywords encoding E-coins, and the signed index is used to prevent double spending by customers and to resolve disputes between vendors. There is no dependency on customer trust required with this approach. Customers have an E-wallet that manages their available E-coins: the wallet may reside on the customer s PC or may reside on the broker and vendor machines, being passed from vendor to vendor as the customer accesses information at their web sites. In our NetPay approach we make the
5 assumption that the broker is honest and is trusted by both the customers and the vendors. The micro-payments only involve customers and vendors, and the broker is responsible for the registration of customers and for crediting the vendors account and debiting customers accounts. Fig. 2 outlines some of the key NetPay system interactions. Initially a customer accesses the broker s web site to open an account and acquire a number of E-coins from the broker (bought using a single macro-payment). The broker sends an E-wallet that includes the E-coin ID and E-coins to the customer and the customer s host caches this information. The customer browses the home page of the journal web site and finds a desired article to read. Each article will have a small cost e.g. 5-10c, and the customer would typically read a number of these. When wishing to read the details of an article, the customer clicks on the article heading and the vendor system debits the customer s E-coins by e.g.. 10c. The vendor verifies that the E-coin provided by the customer s E-wallet is valid by use of a touchstone obtained once only from the broker. If the payment is valid (coin is verified and sufficient credit remains), the article is displayed on the screen. The customer may browse other articles, their coins being debited (the index of spent coins incremented) each time an article is read. If E-coins run out, the customer is directed to the broker s site to buy more. Broker Customer HTTPS HTTP Server Staff PCs Customer PCs Browser+EWallet SQL Bank HTTP Application Server SQL SQL DB Server Vendor1 HTTP Vendor2 EDI; ; Custom Authorisation HTTP Server Perl CGIs socket Application Server - C++ SQL SQL DB Server Web Container (JSPs) EJB container (EJBs) J2EE Server SQL SQL DB Server Fig. 3. Basic NetPay software architecture When the customer changes to another site, the new vendor site first requests the current E-coin touchstone information from previous vendor s site. The new vendor contacts the previous vendor to get the E-coin touchstone and spent coin index and then debits coins for to further news articles. At the end of each day, the vendors all send the E-coins to the broker redeeming them for real money.
6 4 A Component-based NetPay Architecture We initially developed a software architecture for implementing NetPay-based micropayment systems for thin-client web applications that used hard-coded vendor facilities for micro-payment [4]. We have extended this work to develop component-based NetPay vendor services, supporting much more easily and seamlessly reused vendor server-side NetPay functionality. NetPay micro-payment transactions involve three key parties: the Broker Server, the Vendor Server, and the Customer browser. This architecture is illustrated in Fig. 3. The Broker server and the Customer browser are same as the previous NetPay architecture [4]. The Vendor web sites provide a web server and possibly a separate application server, depending on the webbased system architecture they use. The Vendor web server pages provide content that needs to be paid for and each access to these pages require one or more E-coins from the customers E-wallets in payment. In our architecture Vendor application server accesses the Broker application server to obtain touchstone information to verify the E-coins being spent and to redeem spent E-coins. They communicate with other vendor application servers to pass on E-coin indexes and touchstones. Vendors may use quite different architectures and implementation technology. In the example above, Vendor #1 uses a web server with Perl-implemented CGI scripts, C++-implemented application server and relational database. Vendor #2 uses a J2EEbased architecture with J2EE server providing Java Server Pages (web user interface services) and Enterprise Java Beans (application server services), along with a relational database to hold vendor data. 5 NetPay Component Our example E-Journal system has a number of customer web browser clients used by customers to access the journal site and read article contents. Another web client is used by staff to manage the redemption of spent E-coins with the NetPay broker server. The vendor J2EE server has a number of web pages e.g. JSPs or servlets and EJBs providing an implementation of the E-journal web system. We add to this a number of NetPay components: EJBs to provide E-wallet management (tracking spending of E-coins by customers; E-coin exchange with the client-side E-wallent application or server-side W-wallet management; touchstone exchange with the Net- Pay broker or other vendors and E-coin validation). We also provide redemption support for the vendor to communicate with the NetPay broker and redeem customerspent E-coins for real money. Fig. 4 shows a high-level view of how these various components interact. The enduser clients access only the session beans. Within the enterprise bean tier, the session beans are clients of the entity beans. On the back end of the system, the entity beans access the database tables that store the entity states. The Session beans access the client-side E-wallet application, broker server and other NetPay-implementing vendor servers via remote object interfaces.
7 In our E-journal example system one session bean, ArticleDBEJB, represents an interface to the journal article database and is used to select article records. A number of JSPs provide for customer login (if required), journal information and highlevel organisation, journal searching and article display. There are two NetPay session beans that have been added to this E-journal system, EwalletControllerEJB and RedeemControllerEJB. These session beans provide a client's view of the application's business logic such as MakePayment, ValidateECoins, EwalletReqest and RedeemPayment. Hidden from the clients are the server-side routines that implement the business logic, access databases, manage relationships, and perform error checking. Web Container J2EE Server Customer Web Browsers Login with e-coinid & password Display Article s title & left e-coins Display Article content & left e-coins Journal s Session Beans NetPay JSP proxy/wrapper Journal s Entity Beans Journal DB Staff Web Browsers Client-side E- wallets Redeem e-coins E-wallet Controller Session Bean Redeem Controller Session Bean E-wallet Entity Bean Redeem Entity Bean Netpay DB Other Vendor Broker Fig. 4. E-Journal System with NetPay Components For each NetPay business entity the system has a matching entity bean, in this case an EwalletEJB and RedeeemEJB. These beans provide a component-based interface to various database tables: EWallet, ECoin and RedeemCoin. For each column in a table, the corresponding entity bean has an instance variable. Because they use bean-managed persistence, the entity beans contain the SQL statements that access the tables. For example, the create method of the EwalletEJB entity bean calls the SQL INSERT command. The NetPay database tables that are used by our entity beans
8 may be added to the existing E-journal database if this is possible, or may be stored in a separate database of their own if required. In order to add our NetPay micro-payment facility to the E-journal, or to other 3 rd party J2EE-based applications, we need to be able to add our EJBs to their J2EE server and to detect when pages are being accessed by customers that need to be paid for. We also need to ensure that if the customer attempting access does not have enough E-coins they are directed to the NetPay broker site to buy some more. If the customer wants a server-side E-wallet managed by the vendor vs running a client-side E-wallet application, we need to have the vendor obtain the customer NetPay username/password and obtain the E-wallet from the NetPay broker or the previouslyvisited NetPay-enabled vendor. In addition the customer usually wants an idea about the cost of an article or other information/service before purchase, and access to their available credit in E-coins. There are three main ways to integrate the NetPay user interface facilities: (1) modify the existing system web pages to incorporate NetPay information (we have developed some JSP page includes so this can be done easily); (2) generate web pages that display the existing system pages in frames and make appropriate interactions with NetPay EJB components; and (3) generate proxy web pages that interact with NetPay session beans and redirect access to the original web pages. These approaches are illustrated in Fig. 5 below. Each has advantages and disadvantages the first requiring updates to the existing system web page implementations, the later two requiring renaming of these pages so the generated pages are passed control at appropriate times. In this paper we show examples of the E-journal extended using the first approach. 3. NetPay proxy JSP Page Customer Browser (3) (1) (redirect) 2. NetPay JSP + Frame E-Journal Session Bean (2) Original E-Journal JSP 1. Included NetPay JSP NetPay EWallet Session Bean Fig. 5. Ways of integrating NetPay micro-payment functionality with E-journal web pages A sequence diagram is used in Fig. 6 to show how interactions occur between various components in our NetPay-enabled E-Journal application. For example, when buying an article the customer selects the article for reading e.g. clicking on the URL in a returned article search page or in a journal content page. The web browser requests the article content from the appropriate JSP, and this JSP or its generated proxy requests payment for the content of the article from the NetPay E-wallet session bean. The E-wallet session bean communicates with either the client-side E-wallet or the server-side E-wallet (managed by the E-wallet entity bean) to debit the customer s E- coins to pay for the article. If insufficient coins are available, the customer is directed
9 to the broker site to buy more. Otherwise, the journal article content is displayed to the customer. : Customer Web Browser Client-side E-wallet NetPay JSPProxy/Include EJournal Article JSP NetPay EWalletBean EJournal ArticleBean Broker Buy CoinsJSP Click URL Request Content Request Payment debit coins [if no e-coins left, redirect to NetPay broker to buy more...] Buy Coins Get Content Get Article Content Fig. 6. Click-buy Article and Redeem E-coins Sequence Diagram 6 Implementation In previous work we implemented a -based vendor architecture [3]. However, these NetPay components are not optimally reusable and substantial modifications may need to be made to an existing web-based application to incorporate them. We implemented these new NetPay J2EE EJBs and JSP includes to allow for much easier plug-in of NetPay micropayment facilities into existing J2EE applications. Fig. 7. Plugging in the NetPay vendor-side components with a J2EE deployment tool The Ewallet and Redeem EJB components are plugged into the existing E-journal system by deploying them into the E-journal system s J2EE server. The Ewallet com-
10 ponent is used to obtain E-wallet from broker or another vendor, make payments by using the client-side or server-side Ewallet managed E-coins, and to generate redeem request data. The Redeem component is responsible for selecting payments and sending these to the NetPay broker. EJB deploytool provides interface to define relationships between enterprise beans. That makes it easier to plug-and-play components. Fig. 7 illustrates the interface and the relationship between Ewallet component and Redeem component. There is no relationship among existing journal component (ArticleDBJAR) and NetPay components. The NetPay components are plugged in the existing system very straightforwardly. 7 Discussion The area of micro-payment on the Internet has attracted much recent research attention. Besides NetPay, there are several micro-payment systems that are based on a payword-based micro-payment protocol. These systems can be classified as creditbased and debit-based. Payword [10] is an off-line credit-based system where a user s account is not debited until some time after purchases. This provides more opportunity for fraud since a large number of purchases can be made against an account with insufficient funds. PayFair [11] is a debit-based micro-payment system that employs some parts of the Payword scheme. A payword chain purchased from the broker will be bound to a specific vendor. Many payword chains can be purchased in advance from the broker and stored in the customer s machine. There is no digital-signature required for witness of the payment promise in the system. NMP [12] is a credit-based protocol that improves the fairness for customers from Payword protocol. The Payword-based micro-payment systems described above share a key disadvantage - they are all vendor specific. The E-coin (paywords) in the systems are only usable at one vendor and have no value for any another vendor. Some currently available micro-payment protocols are not only specifically designed for selling information goods on the Internet, but they can also be used for wireless communications [13], [14]. This can be an important issue for mobile communications where call charges are still large in comparison with Internet based communications. It also reduces delay and removes the possibility of incomplete payment protocols due to communications failures. Our NetPay server-side E-wallet can be used to provide a similar capability. The use of component-based approaches to building and extending enterprise and web-based systems has become popular [16], [17], [18], [19], [21]. Many approaches focus on enterprise business logic extension [16], [18], rather than a combination of user interface and logic extensions [19], [20]. Our approach to adding NetPay to an existing E-journal uses a similar technique to that we developed for adding collaborative work components to an existing travel-planning application [20]. We plugged in EJBs into the E-journal s existing application server and annotated the E-journal s JSPs to make appropriate E-coin balance, article cost, credit checks and coin debits to the NetPay EJBs. This allows for minimal or no code impact (none if using proxy JSP
11 pages) to the existing system s infrastructure. The use of an EJB-based software architecture enables the application developer to work on the business logic aspects of the application without having to be concerned with system-level issues, such as transactions, security, multithreading, and so forth. In addition, the NetPay EJBs are completely separated from the particular domain knowledge of the web application, enabling each enterprise bean to be reused in different EJB-based vendor systems via plug-and-play with the existing vendor components. While our approach to adding NetPay user interface support to existing J2EE-based vendor application JSPs is basic, usability evaluation of this NetPay-enabled application has indicated it provides a good user interface to users. We are currently designing a portal infrastructure using web services that will allow a NetPay-enabled vendor to act as a purchasing portal to non-netpay supporting vendors by redirecting page accesses to these vendors and charging the customers E-coins in the process. This approach will allow for dynamic registration of vendors and support cross-vendor product searching. We are investigating approaches to using NetPay for mobile information content micro-payment applications, both with a server-side E- wallet and client-side E-wallet storage by the mobile device. Our other work focuses on the development of tools to allow existing component-based applications to be NetPay-enabled without any manual component programming, deployment and configuration. We will apply these to experimenting with adding NetPay to other 3 rd party J2EE web applications. 8 Summary We have described the design and development of software components to enable NetPay to be seamlessly added to existing J2EE-based web applications. NeyPay functionality is embodied in Enterprise JavaBean software components and JSP includes or proxies, allowing the existing application to be easily micro-payment enabled. Our NetPay EJBs use a infrastructure to communicate with customers client-side E-wallet applications, with a broker server, and with other vendor application servers, whether J2EE-based or not. We have successfully added NetPay components to as separately-developed J2EE-implemented E-journal application to demonstrate our approach s feasibility. References 1. Blankenhorn, D.: Charging for Content, E-commerce Times Dai, X. and Lo, B.: NetPay An Efficient Protocol for Micropayments on the WWW. Fifth Australian World Wide Web Conference, Australia (1999) 3. Dai, X., Grundy, J. and Lo, B.: Comparing and contrasting micro-payment models for E- commerce systems, International Conferences of Info-tech and Info-net (ICII), China (2001)
12 4. Dai, X., Grundy, J.: Architecture of a Micro-Payment System for Thin-Client Web Applications. In Proceedings of the 2002 International Conference on Internet Computing, Las Vegas, CSREA Press, June 24-27, Furche A. and Wrightson, G.: SubScrip An efficient protocol for pay-per-view payments on the Internet, The 5 th Annual International Conference on Computer Communications and Networks, USA (1996) 6. Herzberg, A. and Yochai, H. : Mini-pay: Charging per Click on the Web, Herzberg, A.: Safeguarding Digital Library Contents - Charging for Online Content. D- Lib Magazine (1998), ISSN Hwang, M-S., Lin, I-C. and Li, L-H.: A simple micro-payment scheme. Journal of Systems & Software, 55(3)(2001) Manasse, M.: The Millicent Protocols for Electronic Commerce. First USENIX Workshop on Electronic Commerce. New York (1995) 10. Rivest, R. and Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. Proceedings of 1996 International Workshop on Security Protocols, Lecture Notes in Computer Science, Vol Springer (1997) Yen, S-M.: PayFair: a prepaid internet ensuring customer fairness micropayment scheme. IEE Proceedings-E Computers & Digital Techniques, vol.148, no.6, Nov. 2001, pp Publisher: IEE, UK. 12. Ji, D-Y. and Wang, Y-M.: A micropayment protocol based on PayWord. Acta Electronica Sinica, 30(2)(2002) Sangjin, K., Heekuck, O.: An atomic micropayment system for a mobile computing environment. IEICE Transactions on Information & Systems. E84-D(6) (2001), DongGook, P., Boyd, C., Dawson, E.: Micropayments for wireless communications. Information Security and Cryptology - ICISC Third International Conference. Proceedings (Lecture Notes in Computer Science Vol.2015). Springer-Verlag, Berlin, Germany (2001), McGarvey, R.: Micropayments enable teensy content purchases. Econtent, 24(1) (2001) Allen, P.: Realising E-Business with Components. Addison-Wesley, October Bichler, M., Segev, A., Zhao, J.L.: Component-based E-Commerce: Assessment of Current Practices and Future Directions. SIGMOD Record 27(4)(1998) Fingar, P.: Component-Based Frameworks for E-Commerce. Communications of the ACM(2000) 19. Chong, N.S.T., Sakauchi, M.: e-cobrowse: co-navigating the Web with chat-pointers and add-ins - problems and promises. Parallel and Distributed Computing and Systems 2(2000) Grundy, J.C., Wang, X., Hosking, J.G.: Building Multi-device, Component-based, Thinclient Groupware: Issues and Experiences. In Proceedings of the 3 rd Australasian User Interface Conference, Melbourne, Australia (2002) Ryley, S.: Corporate portal development: a practical approach ensures real business benefits. Business Information Review 18(2)(2001) 28 34
Comparing and contrasting micro-payment models for E-commerce systems
Comparing and contrasting micro-payment models for E-commerce systems Xiaoling Dai 1, John Grundy 1 and Bruce W N Lo 2 1 Department of Computer Science University of Auckland Private Bag 92019, Auckland,
Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks
Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks Xiaoling Dai 1, Kaylash Chaudhary 2 and John Grundy 3 School of Computing Information and Mathematics Science The University
What Is the Java TM 2 Platform, Enterprise Edition?
Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today
Detailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology [email protected] Fall 2007
Internet Engineering: Web Application Architecture Ali Kamandi Sharif University of Technology [email protected] Fall 2007 Centralized Architecture mainframe terminals terminals 2 Two Tier Application
PayWord and MicroMint: Two Simple MicroPayment Schemes
PayWord and MicroMint: Two Simple MicroPayment Schemes Ronald L. Rivest (MIT) Adi Shamir (Weizmann) Outline Micropayments: Framework and Motivation PayWord: : a credit-based scheme using chains of hash
How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer
How to Build an E-Commerce Application using J2EE Carol McDonald Code Camp Engineer Code Camp Agenda J2EE & Blueprints Application Architecture and J2EE Blueprints E-Commerce Application Design Enterprise
: Test 217, WebSphere Commerce V6.0. Application Development
Exam : IBM 000-217 Title : Test 217, WebSphere Commerce V6.0. Application Development Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking
A framework for web-based product data management using J2EE
Int J Adv Manuf Technol (2004) 24: 847 852 DOI 10.1007/s00170-003-1697-8 ORIGINAL ARTICLE M.Y. Huang Y.J. Lin Hu Xu A framework for web-based product data management using J2EE Received: 8 October 2002
Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.
Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company
Java Technology in the Design and Implementation of Web Applications
Java Technology in the Design and Implementation of Web Applications Kavindra Kumar Singh School of Computer and Systems Sciences Jaipur National University Jaipur Abstract: This paper reviews the development
JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
SOFTWARE ENGINEERING TRACK JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19
3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server
2012 LABVANTAGE Solutions, Inc. All Rights Reserved.
LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written
Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB
September Case Studies of Running the Platform NetBeans UML Servlet JSP GlassFish EJB In this project we display in the browser the Hello World, Everyone! message created in the session bean with servlets
Understanding Application Servers
Understanding Application Servers Author: Ajay Srivastava & Anant Bhargava TCS, Jan 03 Background Application servers, whatever their function, occupies a large chunk of computing territory between database
Building Java Servlets with Oracle JDeveloper
Building Java Servlets with Oracle JDeveloper Chris Schalk Oracle Corporation Introduction Developers today face a formidable task. They need to create large, distributed business applications. The actual
The e-payment Systems
The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic
CatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
Electronic Commerce and E-wallet
International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: [email protected]
Client/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
Credit card: permits consumers to purchase items while deferring payment
General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Digital Rights Management for the Online Music Business
Digital Rights Management for the Online Business Sai Ho Kwok Digital rights management has become a pressing concern for the online music business. Existing digital rights management systems are backed
Architectural Overview
Architectural Overview Version 7 Part Number 817-2167-10 March 2003 A Sun ONE Application Server 7 deployment consists of a number of application server instances, an administrative server and, optionally,
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
Introduction to Sun ONE Application Server 7
Introduction to Sun ONE Application Server 7 The Sun ONE Application Server 7 provides a high-performance J2EE platform suitable for broad deployment of application services and web services. It offers
Building Web Applications, Servlets, JSP and JDBC
Building Web Applications, Servlets, JSP and JDBC Overview Java 2 Enterprise Edition (JEE) is a powerful platform for building web applications. The JEE platform offers all the advantages of developing
Programming SIP Services University Infoline Service
Programming SIP Services University Infoline Service Tatiana Kováčiková, Pavol Segeč Department of Information Networks University of Zilina Moyzesova 20, 010 26 SLOVAKIA Abstract: Internet telephony now
Enterprise Application Integration
Enterprise Integration By William Tse MSc Computer Science Enterprise Integration By the end of this lecturer you will learn What is Enterprise Integration (EAI)? Benefits of Enterprise Integration Barrier
Application of Electronic Currency on the Online Payment System like PayPal
Application of Electronic Currency on the Online Payment System like PayPal Rafael Martínez Peláez, Francisco J. Rico Novella Technical University of Catalonia (UPC), Department of Telematics Engineering
A Framework of Model-Driven Web Application Testing
A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China
ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper 341-2009
Paper 341-2009 The Platform for SAS Business Analytics as a Centrally Managed Service Joe Zilka, SAS Institute, Inc., Copley, OH Greg Henderson, SAS Institute Inc., Cary, NC ABSTRACT Organizations that
Novell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
Distributed Objects and Components
Distributed Objects and Components Introduction This essay will identify the differences between objects and components and what it means for a component to be distributed. It will also examine the Java
Customer Bank Account Management System Technical Specification Document
Customer Bank Account Management System Technical Specification Document Technical Specification Document Page 1 of 15 Table of Contents Contents 1 Introduction 3 2 Design Overview 4 3 Topology Diagram.6
Software Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
Title Page. Hosted Payment Page Guide ACI Commerce Gateway
Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Interoperable Mobile Payment A Requirements-Based Architecture
Interoperable Mobile Payment A Requirements-Based Architecture Dr. Manfred Männle Encorus Technologies GmbH; product management Payment Platform Summary: Existing payment methods like cash and debit/credit
The Design of B2B E-commerce System Based on MVC Model and J2EE
MANAGEMENT SCIENCE AND ENGINEERING Vol. 4, No. 4, 2010, pp. 113-119 www.cscanada.org ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net The Design of B2B E-commerce System Based on MVC Model
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
Portals, Portlets & Liferay Platform
Portals, Portlets & Liferay Platform Repetition: Web Applications and Model View Controller (MVC) Design Pattern Web Applications Frameworks in J2EE world Struts Spring Hibernate Data Service Java Server
G-Monitor: Gridbus web portal for monitoring and steering application execution on global grids
G-Monitor: Gridbus web portal for monitoring and steering application execution on global grids Martin Placek and Rajkumar Buyya Grid Computing and Distributed Systems (GRIDS) Lab Department of Computer
Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur
Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker
Introduction to Cloud Computing. Lecture 02 History of Enterprise Computing Kaya Oğuz
Introduction to Cloud Computing Lecture 02 History of Enterprise Computing Kaya Oğuz General Course Information The textbook: Enterprise Cloud Computing by Gautam Shroff (available at bookstore). Course
Technical Analysis Document
Technical Architecture Technical Analysis Document The table below shows the various possibilities that sonic sounds have to host their e-commerce site on. The hosting type is described and then advantages
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
Chapter 5. Regression Testing of Web-Components
Chapter 5 Regression Testing of Web-Components With emergence of services and information over the internet and intranet, Web sites have become complex. Web components and their underlying parts are evolving
HPC Portal Development Platform with E-Business and HPC Portlets
HPC Portal Development Platform with E-Business and HPC Portlets CHIEN-HENG WU National Center for High-Performance Computing, Hsin-Chu, 300, Taiwan E-mail: [email protected] Abstract HPC Portal Development
Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair
An Easy, Secure and Reliable Online Shopping & Payment System
An Easy, Secure and Reliable Online Shopping & Payment System Ripan Kumar Basak 1, Dr. Avula Damodaram 2 1 JNTUH, School of Information Technology, Kukatpally, Hyderabad, Telangana, India-5000 85 2 Professor
PHP Web Authoring for Database Management based on MVC Pattern
, October 19-21, 2011, San Francisco, USA PHP Web Authoring for Database Management based on MVC Pattern Chanchai Supaartagorn Abstract Nowadays, the MVC pattern is the effective method for the development
An introduction to creating JSF applications in Rational Application Developer Version 8.0
An introduction to creating JSF applications in Rational Application Developer Version 8.0 September 2010 Copyright IBM Corporation 2010. 1 Overview Although you can use several Web technologies to create
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Java E-Commerce Martin Cooke, 2002 1
Java E-Commerce Martin Cooke, 2002 1 Money, architecture & enterprise Today s lecture Online monetary transactions Tiered architectures Java Enterprise (J2EE) Online monetary transactions* Martin Cooke
Fig (1) (a) Server-side scripting with PHP. (b) Client-side scripting with JavaScript.
Client-Side Dynamic Web Page Generation CGI, PHP, JSP, and ASP scripts solve the problem of handling forms and interactions with databases on the server. They can all accept incoming information from forms,
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications by Samuel D. Kounev ([email protected]) Information Technology Transfer Office Abstract Modern e-commerce
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Certified E-commerce Consultant (CEC)
Certified E-commerce Consultant (CEC) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of
NetBeans IDE Field Guide
NetBeans IDE Field Guide Copyright 2005 Sun Microsystems, Inc. All rights reserved. Table of Contents Introduction to J2EE Development in NetBeans IDE...1 Configuring the IDE for J2EE Development...2 Getting
Design Approaches of Web Application with Efficient Performance in JAVA
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 141 Design Approaches of Web Application with Efficient Performance in JAVA OhSoo Kwon and HyeJa Bang Dept
EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.
WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad
Test Run Analysis Interpretation (AI) Made Easy with OpenLoad OpenDemand Systems, Inc. Abstract / Executive Summary As Web applications and services become more complex, it becomes increasingly difficult
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
How To Protect Your Computer From Being Hacked On A J2Ee Application (J2Ee) On A Pc Or Macbook Or Macintosh (Jvee) On An Ipo (J 2Ee) (Jpe) On Pc Or
Pistoia_ch03.fm Page 55 Tuesday, January 6, 2004 1:56 PM CHAPTER3 Enterprise Java Security Fundamentals THE J2EE platform has achieved remarkable success in meeting enterprise needs, resulting in its widespread
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS
A GENERIC ARCHITECTURE FOR WEB APPLICATIONS TO SUPPORT THREAT ANALYSIS OF INFRASTRUCTURAL COMPONENTS Lieven Desmet, Bart Jacobs, Frank Piessens, and Wouter Joosen DistriNet Research Group, Katholieke Universiteit
SAP Web Application Server 6.30: Learning Map for Development Consultants
SAP Web Application Server 6.30: Learning Map for Development Consultants RECENT UPDATES VIEWER SOFTWARE SEARCH Step 1: Learn What You Need Update your core competence - must know Step 2: Prepare for Your
Modern Software Development Tools on OpenVMS
Modern Software Development Tools on OpenVMS Meg Watson Principal Software Engineer 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Topics
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Electronic payment systems
Electronic payment systems overview of basic concepts credit-card based systems (MOTO, SSL, SET) electronic cash systems (DigiCash) micropayment schemes (PayWord, probabilistic schemes) brief history of
Business Process Management with @enterprise
Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
ERIE COMMUNITY COLLEGE COURSE OUTLINE A. COURSE TITLE: CS 103 - WEB DEVELOPMENT AND PROGRAMMING FUNDAMENTALS
ERIE COMMUNITY COLLEGE COURSE OUTLINE A. COURSE TITLE: CS 103 - WEB DEVELOPMENT AND PROGRAMMING FUNDAMENTALS B. CURRICULUM: Mathematics / Computer Science Unit Offering C. CATALOG DESCRIPTION: (N,C,S)
Stock Trader System. Architecture Description
Stock Trader System Architecture Description Michael Stevens [email protected] http://www.mestevens.com Table of Contents 1. Purpose of Document 2 2. System Synopsis 2 3. Current Situation and Environment
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security
Software Architecture
Software Architecture Definitions http://www.sei.cmu.edu/architecture/published_definiti ons.html ANSI/IEEE Std 1471-2000, Recommended Practice for Architectural Description of Software- Intensive Systems
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
HPC PORTAL DEVELOPMENT PLATFORM
HPC PORTAL DEVELOPMENT PLATFORM Chien-Heng Wu, National Center for High-Performance Computing, [email protected] ABSTRACT In the world of information technology, enterprise applications must be designed,
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
