Synthesis of context‐aware business‐to‐business processes for location‐based services through choreographies

Author(s):  
Gianluca Filippone ◽  
Marco Autili ◽  
Massimo Tivoli
2011 ◽  
pp. 9-15
Author(s):  
Robert J. Mockler ◽  
Dorothy G. Dologite ◽  
Marc E. Gartenfeld

Every organization can be viewed from two perspectives. There are external processes such as procurement and sales, and internal processes such as management and operations, finance, marketing, and human resources. This article primarily focuses on external, commercial e-business processes. B2B (business-to-business) e-business is the sale of products or services, or information exchange, among two or more businesses through electronic technology, usually involving the Internet, through a public or private exchange. The following background section gives a very brief general overview of B2B e-business history. In the main thrust of this article, we discuss making the B2B decision by examining key B2B business requirements and benefits, as well as describing basic approaches to B2B e-business implementation. In the subsequent section, the article provides a future outlook for e-business.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Madhuri Siddula ◽  
Yingshu Li ◽  
Xiuzhen Cheng ◽  
Zhi Tian ◽  
Zhipeng Cai

While social networking sites gain massive popularity for their friendship networks, user privacy issues arise due to the incorporation of location-based services (LBS) into the system. Preferential LBS takes a user’s social profile along with their location to generate personalized recommender systems. With the availability of the user’s profile and location history, we often reveal sensitive information to unwanted parties. Hence, providing location privacy to such preferential LBS requests has become crucial. However, the current technologies focus on anonymizing the location through granularity generalization. Such systems, although provides the required privacy, come at the cost of losing accurate recommendations. Hence, in this paper, we propose a novel location privacy-preserving mechanism that provides location privacy through k-anonymity and provides the most accurate results. Experimental results that focus on mobile users and context-aware LBS requests prove that the proposed method performs superior to the existing methods.


Author(s):  
Robert J. Mockler ◽  
Dorothy G. Dologite ◽  
Marc E. Gartenfeld

Every organization can be viewed from two perspectives. There are external processes such as procurement and sales, and internal processes such as management and operations, finance, marketing, and human resources. This article primarily focuses on external, commercial e-business processes. B2B (business-to-business) e-business is the sale of products or services, or information exchange, among two or more businesses through electronic technology, usually involving the Internet, through a public or private exchange. The following background section gives a very brief general overview of B2B e-business history. In the main thrust of this article, we discuss making the B2B decision by examining key B2B business requirements and benefits, as well as describing basic approaches to B2B e-business implementation. In the subsequent section, the article provides a future outlook for e-business.


Author(s):  
Pablo David Villarreal ◽  
Enrique Salomone ◽  
Omar Chiotti

This chapter describes the application of MDA (model driven architecture) and UML for the modeling and specification of collaborative business processes, with the purpose of enabling enterprises to establish business-to-business collaborations. The proposed MDA approach provides the components and techniques required for the development of collaborative processes from their conceptual modeling to the specifications of these processes and the partners’ interfaces in a B2B standard. As part of this MDA approach, a UML profile is provided that extends the semantics of UML2 to support the analysis and design of collaborative processes. This UML profile is based on the use of interaction protocols to model collaborative processes. The application of this UML profile in a case study is presented. Also, an overview is provided about the automatic generation of B2B specifications from conceptual models of collaborative processes. In particular, the generation of B2B specifications based on ebXML is described.


2009 ◽  
pp. 1478-1497
Author(s):  
Duncan R. Shaw ◽  
Christopher P. Holland ◽  
Peter Kawalek ◽  
Bob Snowdon ◽  
Brian Warboys

This paper investigates the collective use of a simple modeling technology by highly complex, heterogeneous and numerous groups of stakeholders who heavily depend upon it to mediate their interactions. We use economic theory, design theory, complex systems theory and business process modeling concepts to analyze deregulation and business to business interaction in the UK electricity industry, and the strategic business and IT response of Electric Co, a large electricity supply company. The relevance of this study comes from its investigation of a novel example of the shaping of a whole sector’s ebusiness through regulatory law and thus we are concerned with enterprise and inter-enterprise systems not purely with ERP systems. We focus on model-based business interaction and its effect upon the business and consumer behaviors of a whole country’s electricity sector. This sector is a socio-technical system; so business processes and consumer behaviors are not only shaped by the regulator’s legally enforced business to business process interaction model, but the opinions of businesses and the public also influence how the regulator updates its model. Thus business behaviors, consumer behaviors and the model interact to shape each other. By moving from intra to inter-organizational business processes we seek to demonstrate and explain the value of models in e-business where the complexity of interacting business systems involves many thousands of parameters. We show how developments in technical standards and business process management are related to inter-organizational interaction and coordination.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Xuejun Zhang ◽  
Haiyan Huang ◽  
Shan Huang ◽  
Qian Chen ◽  
Tao Ju ◽  
...  

The proliferation of location-based services, representative services for the mobile networks, has posed a serious threat to users’ privacy. In the literature, several privacy mechanisms have been proposed to preserve location privacy. Location obfuscation enforced using cloaking region is a widely used technique to achieve location privacy. However, it requires a trusted third-party (TTP) and cannot sufficiently resist various inference attacks based on background information and thus is vulnerable to location privacy breach. In this paper, we propose a context-aware location privacy-preserving solution with differential perturbations, which can enhance the user’s location privacy without requiring a TTP. Our scheme utilizes the modified Hilbert curve to project every 2-d location of the user in the considered map to 1-d space and randomly generates the reasonable perturbation by adding Laplace noise via differential privacy. In order to solve the resource limitation of mobile devices, we use a quad-tree based scheme to transform and store the user context information as bit stream which achieves the high compression ratio and supports efficient retrieval. Security analysis shows that our proposed scheme can effectively preserve the location privacy. Experimental evaluation shows that our scheme retrieval accuracy is increased by an average of 15.4% compared with the scheme using standard Hilbert curve. Our scheme can provide strong privacy guarantees with a bounded accuracy loss while improving retrieval accuracy.


2012 ◽  
Vol 56 (11) ◽  
pp. 2551-2568 ◽  
Author(s):  
Aniket Pingley ◽  
Wei Yu ◽  
Nan Zhang ◽  
Xinwen Fu ◽  
Wei Zhao

2020 ◽  
Vol 8 (6) ◽  
pp. 5826-5831

Many traditional systems give recommendations to the users based on their past history without considering the context of the situation the user is in currently. Such systems may be good at prediction based on the past but do not consider the rapidly changing environment and the prediction may not be the best for the user. Context personalized to the user is important because it explains the situation the user is in. The recommendations to the user should also change according to the various contexts present. Context often represents the hidden state information that the user is in currently. Many systems often take into consideration the location of the user because the situation of the user generally changes with the location. In this paper, we explain why context is important while predicting results for the users by reviewing a set of papers where different contexts such as weather, time, location, user preference, and activity have been taken into consideration. These papers have taken context such that the recommendations to users change dynamically according to their situation or location and these recommendations can be of various forms such as search results or targeted advertisement. Location based Services, Location based advertisement and several types of context have also been discussed in the paper. A general architecture of context-aware systems has also been proposed. Several real world companies also make use of this contextual information so that the user has a dynamic user experience where all the states which might affect his decision making are taken into consideration.


2011 ◽  
Vol 2 (2) ◽  
pp. 1-13
Author(s):  
Xining Li ◽  
Jiazao Lin

Mobile commerce (M-commerce) is an attractive research area due to its relative novelty, rapid growth, and great potential in business applications. Over the last decade, various M-commerce applications have been geared to target mobile users and achieved great success. However, most M-commerce applications are developed by different retailers for special purposes and thus lack fully automated business processes to integrate various existing services. This paper presents a novel infrastructure, Call U Back (CUB), for M-commerce applications. The proposed scheme integrates concepts of agent and context-aware workflow to implement automated trading tasks and compose services dynamically. The context awareness is based on ontology and logic models which derive from a set of descriptive contextual attributes for knowledge sharing and logical inference. Based upon the context-aware workflow analysis, the system will generate automated intelligent agents to conduct commerce transactions on behalf of mobile users. The middleware layer of the CUB server has been implemented. An experimental prototype of the system is under development and testing.


Sign in / Sign up

Export Citation Format

Share Document