290 likes | 648 Views
Web programming and e-commerce Hua Wang University of Southern Queensland Outline Introduction Issues and challenges Web programming Work I have done Future work 1. Introduction
E N D
Web programming and e-commerce Hua Wang University of Southern Queensland
Outline • Introduction • Issues and challenges • Web programming • Work I have done • Future work
1. Introduction Sharing business information, maintaining business relationships, conducting business transactions, by means of telecommunications networks (Zwass, 1996, International Journal of ECommerce) Ecommerce covers a wide range of commercial activities performed by means of an electronic web that can connect trading partners. It includes: a. EDI, b. Support for interpersonal communication, c. The transfer of money, d. The sharing of databases in the conduct of business. (ZoranMilosevic and AndyBond, The 5th Annual Conference of the Internet Society, 1996) Any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact. (European Commission, 1997)
A number of factors with E-commerce: 1. Business transactions. 2. The parties to such a transaction will maintain contact through electronic means. 3. More efficient business environments.
E-commerce systems : 1. directly connect buyers and sellers; 2. support fully digital information exchange; 3. have no time and place limits; 4. support interactivity and therefore can dynamically adapt to customer behaviour; 5. can be updated in real-time, always up-to-date.
Ecommerce in US households:1996-2002 Jupiter Communications. (1998) http://www.jup.com/digest/980116/stat.shtml
US eCommerce Overview: e-commerce sales will increase at a steady 19 percent year-over-year growth rate, rising to $229.0 billion in 2008 from $114.8 billion in 2004. Online retail sales will account for 10 percent of total US retail sales by 2008.
2. Issues and Challenges Business Consumer Administration Business Figure 1: Participants in E-Commerce
Four distinct categories: • B2B: Using a network for ordering from suppliers, receiving invoices and making payments (EDI). • B2C: Electronic retailing, mostly on the web. • B2A: Transactions such as the details of upcoming government procurements. • C2A: E-payment of taxes, receiving govt. services.
Issues: • Devices • Trust and privacy • E-payment systems • Mass-market adoption • Management and implementation • Security
Major obstacles: • Understanding the technical requirements for an ecommerce site • Lack of a clear business model to guide development • Insufficient corporate resources • Consumer fears about security and privacy • The difficulty of integrating ecommerce web sites into the company’s other business processes
3. Web programming 1. HTML (XHTML) Hypertext Markup Language 2. Java (JavaScript ) 3. CGI Common Gateway Interface 4. ASP (Active Server Pages) 5. PHP ( Hypertext Preprocessor )
Students assignments: http://robert.the-cox-family.com/ java_applets.html http://www.globalsqtech.com/ customer.htm
Bank deposit AP agent Anonymity scalable withdrawal payment Shop User 4. Work I have done Figure 2: New payment model
Senior-Junior OPERATION U-name m n n USERS ROLES PERMISSIONS m m n m n R-name OBJECT User-role assignment Permission-role assignment Figure 3: RBAC relationships
A flexible payment scheme and its role based access control, IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 3, pages: 425-436, March, 2005.
Three participants in an electronic service: • Users, Service providers, and Services. • Example of services: • flight services • Cash • Hence, depending on which parts are bound, • there are different kinds of electronic services.
t0 Types t1 t2 t3 t4 t5 t6 t7 - user - - - + + + + provider - - + + - - + + service - + - + - + - + Table1: Ticket types group_1 ={ t1, t2 , t4 }, group_2 = {t3 , t5 , t 6 , t7 }. New access scheme
Ticket acquisition Clearance Billing Internet User Service provider Ticket usage Credential center Figure 4: Ticket model
2. Achieving Secure and Flexible M-Services Through Tickets, IEEE Transactions on Systems, Man, and Cybernetics. Part A, Vol. 33, Issue: 6, pages: 697- 708, Nov. 2003.
Usage Decision Authorization (A) Objects (O) Subjects (S) Rights (R) Object Attributes Subject Attributes Obligations Conditions Figure 5: Usage control model
3. Towards secure XML document with usage control, The 7th Asia Pacific Web Conference, Lecture Notes in Computer Science, Springer 2005. 4. Formal authorization approaches for permission-role assignment using relational algebra operations, Proceedings of the 14th Australasian Database Conference CSC8408: E-Commerce Technology and Web Database Integration
5. Identifying Role-Based Access Constraints With Object Constraint Language, The Sixth Asia Pacific Web Conference, Lecture Notes in Computer Science,2004. CSC8418: Object-Oriented Design with UML and Java 6. Authorization Algorithms for the Mobility of User-Role Relationship,The 28th Australasian Computer Science Conference (ACSC2005). More …
ARC discovery grant: Protecting information sharing in distributed collaboration environment. Task 1: A role-based delegation framework Task 2: The rule-based policy specification language Task 3: System design Task 4: System implementation
5. Future work and Conclusions Industry partner ARC linkage grant: Advanced role-based access control architecture for enterprise-wide applications A book.
E-commerce • Categories • Web programming • Work I have done
Thank you! Enjoy your day!