Enterprise information systems with a great use of Web 2.0 technologies will be more open, free, and more efficient. With the contrast between classic Web technologies and Web 2.0 technologies, we represent a sample o...Enterprise information systems with a great use of Web 2.0 technologies will be more open, free, and more efficient. With the contrast between classic Web technologies and Web 2.0 technologies, we represent a sample of enterprise information system based on Web 2.0, and show how the use of Web 2. 0 technologies changes the system data exchange model of the enterprise information systems and how it improves the efficiency and effectiveness of information systems.展开更多
To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The command (Web Service Call) is recursively muhicas...To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The command (Web Service Call) is recursively muhicast from top layer of tree to bottom layer of tree and statistical data are gatbered from bottom layer to top layer. We implemented the architecture by using Web Services technology. In our implementation, client program is the requestor of Web Services, and all leaf nodes of the last layer are only the provider of Web Services. For those nodes of intermediate layers, every node is not only the provider of Web Services, but also the dispatcher of Web Services. We take population census as an cxample to describe the working flow of the architecture.展开更多
This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student in...This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.展开更多
To avoid the isolation between the external and the internal information of enterprise information systems, a four-layer integrated framework is proposed on the basis of integrating Web2. 0 and the service- oriented a...To avoid the isolation between the external and the internal information of enterprise information systems, a four-layer integrated framework is proposed on the basis of integrating Web2. 0 and the service- oriented architecture (SOA), which contains the data layer, the service layer, the presentation layer and the collaboration layer. The presentation layer plays the key role, converging the external information from the collaboration layer to the inside of information system (IS), and diffusing the internal information from the service layer to public users. This framework can also illustrate how users contribute to producing new services, and how web services are integrated to collaborate with public users.展开更多
Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abs...Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that outline what can and cannot be done with a consumer’s personally identifiable information (PII). The privacy policy consists of one-to-many privacy rules, with each rule created from a set of six privacy elements: collector, what, purpose, retention, recipient and trust. The PS acts as an intermediary between the service consumer and service provider, to establish an unbiased contract before the two parties begin sending PII. It is shown how many Privacy Services work together to form the privacy protection framework. An examination of what current approaches to protecting privacy in an SOA environment is also presented. Finally, the operations the PS must perform in order to fulfill its tasks are outlined.展开更多
The paper proposes an architectural model of web-based geographic information system based on mashup-technologies. Represented system is designed using the programming patterns and is used to control access rights to ...The paper proposes an architectural model of web-based geographic information system based on mashup-technologies. Represented system is designed using the programming patterns and is used to control access rights to various functions or objects in the system.展开更多
Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address th...Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address the problematic situation of security incidents. The study proposes a human sensor web Crowd sourcing platform for reporting, searching, querying, analyzing, visualizing and responding to security incidents as they arise in real time. Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. It employs outsourcing collaborative efforts initiatives outside the boundaries of the given organization in solving a problematic situation such as how to improve the security of information systems. It was managed by soft systems methodology. Moreover, security maturity level assessment was carried out to determine security requirements for managing security incidents using ISO/IEC 21827: Systems security engineering capability maturity model with a rating scale of 0 - 5. It employed descriptive statistics and non-parametric statistical method to determine the significance of each variable based on a research problem. It used Chi-Square Goodness of Fit Test (X2) to determine the statistical significance of result findings. The findings revealed that security controls and security measures are implemented in ad-hoc. For managing security incidents, organizations should use human sensor web Crowd sourcing platform. The study contributes to knowledge base management learning integration: practical implementation of Crowd sourcing in information systems security.展开更多
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for...In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for product data sharing of manufacturing enterprises in geographically dispersed, heterogeneous system platform. In order to integrate enterprise level product data management (PDM) system and shop floor level distributed numerical control (DNC) system, based on the description of Web services technology, a Web-services-based integration approach is presented for facilitating seamless sharing of product data between PDM and DNC systems in a networked manufacturing environment. In order to verify the validity of the proposed approach, an example-based integration development has been implemented with Java 2 Software Development Kit and Java Web Services Developer Pack in Windows 2000 Professional environment.展开更多
This paper focuses on addressing the problem of web service monitoring by evaluating its suitability and privacy in a distributed web service environment(DWS).The need for web services monitoring and evaluation is nec...This paper focuses on addressing the problem of web service monitoring by evaluating its suitability and privacy in a distributed web service environment(DWS).The need for web services monitoring and evaluation is necessary because the quantity and quality of retrieved web services generally does not fulfill the demands or requirements of the web service requesters.In the literature,many authors proposed suitable solutions for checking the quality of web service in an ad hoc scenario but there is no available testbed for this purpose.In this work,it is proposed to develop a framework as a testbed for evaluating the web service for its suitability and privacy.In order to verify,the retrieved web services fulfill the demands and requirements of the requester in a DWS environment.The Framework to Evaluate the Web Service Suitability(FEWSS)supports service providers in modeling the services with testbed and to design service behavior to comply the service suitability.It generates run-time instances of web services,client’s requests,service registries and other entities in order to emulate realistic SOA environments.By generating a real testbed,our approach assists in runtime test for provider system/services.Particular focus has been put on the privacy policy extensibility to allow the service providers and users in a complex environment.FEWSS also provides an intuitive interface for testing all services under SOA control.展开更多
基金Supported by the China New Gernation InternetProgramof China (CNGI-04-6-2T)
文摘Enterprise information systems with a great use of Web 2.0 technologies will be more open, free, and more efficient. With the contrast between classic Web technologies and Web 2.0 technologies, we represent a sample of enterprise information system based on Web 2.0, and show how the use of Web 2. 0 technologies changes the system data exchange model of the enterprise information systems and how it improves the efficiency and effectiveness of information systems.
基金Supported by the National High-Tech Researchand Development Plan of China (863 Plan 2003AA132080) theResearch Foundationfor Outstanding Young Teachers ,China Univer-sity of Geosciences (CUGQNL0506)
文摘To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The command (Web Service Call) is recursively muhicast from top layer of tree to bottom layer of tree and statistical data are gatbered from bottom layer to top layer. We implemented the architecture by using Web Services technology. In our implementation, client program is the requestor of Web Services, and all leaf nodes of the last layer are only the provider of Web Services. For those nodes of intermediate layers, every node is not only the provider of Web Services, but also the dispatcher of Web Services. We take population census as an cxample to describe the working flow of the architecture.
文摘This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.
基金Open Foundation of Key Laboratory of Information Management and Information Economics (NoF0607-42)
文摘To avoid the isolation between the external and the internal information of enterprise information systems, a four-layer integrated framework is proposed on the basis of integrating Web2. 0 and the service- oriented architecture (SOA), which contains the data layer, the service layer, the presentation layer and the collaboration layer. The presentation layer plays the key role, converging the external information from the collaboration layer to the inside of information system (IS), and diffusing the internal information from the service layer to public users. This framework can also illustrate how users contribute to producing new services, and how web services are integrated to collaborate with public users.
文摘Service-Oriented Architecture (SOA) is a computer systems design concept which aims to achieve reusability and integration in a distributed environment through the use of autonomous, loosely coupled, interoperable abstractions known as services. In order to interoperate, communication between services is very important due to their autonomous nature. This communication provides services with their functional strengths, but also creates the opportunity for the loss of privacy. In this paper, a Privacy Protection Framework for Service-Oriented Architecture (PPFSOA) is described. In this framework, a Privacy Service (PS) is used in combination with privacy policies to create privacy contracts that outline what can and cannot be done with a consumer’s personally identifiable information (PII). The privacy policy consists of one-to-many privacy rules, with each rule created from a set of six privacy elements: collector, what, purpose, retention, recipient and trust. The PS acts as an intermediary between the service consumer and service provider, to establish an unbiased contract before the two parties begin sending PII. It is shown how many Privacy Services work together to form the privacy protection framework. An examination of what current approaches to protecting privacy in an SOA environment is also presented. Finally, the operations the PS must perform in order to fulfill its tasks are outlined.
文摘The paper proposes an architectural model of web-based geographic information system based on mashup-technologies. Represented system is designed using the programming patterns and is used to control access rights to various functions or objects in the system.
文摘Security incidents affecting information systems in cyberspace keep on rising. Researchers have raised interest in finding out how to manage security incidents. Various solutions proposed do not effectively address the problematic situation of security incidents. The study proposes a human sensor web Crowd sourcing platform for reporting, searching, querying, analyzing, visualizing and responding to security incidents as they arise in real time. Human sensor web Crowd sourcing security incidents is an innovative approach for addressing security incidents affecting information systems in cyberspace. It employs outsourcing collaborative efforts initiatives outside the boundaries of the given organization in solving a problematic situation such as how to improve the security of information systems. It was managed by soft systems methodology. Moreover, security maturity level assessment was carried out to determine security requirements for managing security incidents using ISO/IEC 21827: Systems security engineering capability maturity model with a rating scale of 0 - 5. It employed descriptive statistics and non-parametric statistical method to determine the significance of each variable based on a research problem. It used Chi-Square Goodness of Fit Test (X2) to determine the statistical significance of result findings. The findings revealed that security controls and security measures are implemented in ad-hoc. For managing security incidents, organizations should use human sensor web Crowd sourcing platform. The study contributes to knowledge base management learning integration: practical implementation of Crowd sourcing in information systems security.
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
基金Project supported by the National Nature Science Foundation, China (Grant No60574054)Program for NewCentury Excellent Talents in University (2006) the Shanghai Science and Technology Climb Action Foundation( Grant No06DZ11202)
文摘In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for product data sharing of manufacturing enterprises in geographically dispersed, heterogeneous system platform. In order to integrate enterprise level product data management (PDM) system and shop floor level distributed numerical control (DNC) system, based on the description of Web services technology, a Web-services-based integration approach is presented for facilitating seamless sharing of product data between PDM and DNC systems in a networked manufacturing environment. In order to verify the validity of the proposed approach, an example-based integration development has been implemented with Java 2 Software Development Kit and Java Web Services Developer Pack in Windows 2000 Professional environment.
基金the Research Projects sponsored under the Major Project Scheme,UGC,India,Reference Nos:F.No.40-258/2011(SR)。
文摘This paper focuses on addressing the problem of web service monitoring by evaluating its suitability and privacy in a distributed web service environment(DWS).The need for web services monitoring and evaluation is necessary because the quantity and quality of retrieved web services generally does not fulfill the demands or requirements of the web service requesters.In the literature,many authors proposed suitable solutions for checking the quality of web service in an ad hoc scenario but there is no available testbed for this purpose.In this work,it is proposed to develop a framework as a testbed for evaluating the web service for its suitability and privacy.In order to verify,the retrieved web services fulfill the demands and requirements of the requester in a DWS environment.The Framework to Evaluate the Web Service Suitability(FEWSS)supports service providers in modeling the services with testbed and to design service behavior to comply the service suitability.It generates run-time instances of web services,client’s requests,service registries and other entities in order to emulate realistic SOA environments.By generating a real testbed,our approach assists in runtime test for provider system/services.Particular focus has been put on the privacy policy extensibility to allow the service providers and users in a complex environment.FEWSS also provides an intuitive interface for testing all services under SOA control.