Security aspects in modern service component-oriented application logic for social e-commerce systems

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Faisal Nabi ◽  
Xiaohui Tao ◽  
Jianming Yong
Author(s):  
Faisal Nabi ◽  
Jianming Yong ◽  
Xiaohui Tao

The term service component is derived from SCA (service component architecture) for event based distributed system design. Although service component pattern offers composite application development and support application reusability functionality. However, security in event based communication in components interaction model mostly discussed on upper layer in SCA while developing service oriented component application logic. This layer is called application business process logic layer, which produces the application's rendering logic, having being authenticated from ACL.The need for such a comprehensive security review is required in this field that could possibly elaborate the issues in composite application and Event based attack in service component architecture model. The paper achieves this target by analysing, reviewing the security issues, modelling techniques in service component application functionality, while application components, that produces, consume, and processing events.


2017 ◽  
Vol 3 (1) ◽  
pp. 1
Author(s):  
Emi Normalina Omar ◽  
Ahmad Adeel Ramli ◽  
Harlina Suzana Jaafar ◽  
Lailatul Faizah Abu Hassan ◽  
Abdul Kadir Othman ◽  
...  

The demand for Halal products is increasing tremendously not only from Muslim countries but also non-Muslim countries. The component of Halal industry can be classified into three areas, namely services, food and non-food. Halal logistics is categorized into the service component. Halal logistics covers warehousing, transportation and terminal operations. There are three principles of Halal logistics; avoiding direct contact with haram, addressing the risk of contamination, and perception of the Muslim consumer. For non-Muslim countries, the first two principles apply.Malaysia is regarded as a Muslim majority country; therefore, there is a need to explore the level of awareness on Halal logistics. This research paper aims to explore the level of awareness of the Muslim in the Klang Valley, Selangor. Data were collected through convenient sampling from 250 respondents and analyzed by using SPSS.The findings indicate that religious belief is a significant predictor of Halal logistics awareness among Muslims


2014 ◽  
pp. 143
Author(s):  
Pamela Labra Godoy ◽  
Rodrigo Fuentealba J.

Resumen: Los procesos de formación de profesores han estado fuertemente influenciados por una lógica aplicacionista y una visión fragmentada y prescriptiva de la naturaleza del conocimiento. Se puede observar una enseñanza basada en la oralidad, en un bajo trabajo práctico y una escasa vinculación con la realidad educativa y los requerimientos del contexto. Se hace necesario que en dichos procesos se reconozca a los futuros profesores como sujetos de conocimiento con quienes se debiese generar una estructura curricular práctica activa y reflexiva.El reconocer la complejidad de los procesos que se llevan a cabo en el contexto educacional, hace necesario transitar desde una lógica instrumental/mecanicista, proceso-producto a una perspectiva epistemológica donde se rescate el dinamismo del ámbito educacional y la complejidad del sistema social en que éste se encuentra inserto. Palabras clave: Formación Inicial Docente - Construcción de Conocimiento Profesional – Prácticas – Reflexión Profesional Abstract Teacher education processes have been heavily  influenced by application logic, as well as, to a fragmented and prescriptive vision of the nature of knowledge, instead of the construction of it. A teaching process based on the predominance of oral discourse, low practical work, and a limited relation with educational reality and context needs, has been  observed. It seems necessary to recognize student - teachers as knowledge subjects with whom there should be an active/reflective curricular activity, and also recognize the complexity of the processes that take place in the educational context. In other words, it is necessary to move from an instrumental, process/ product perspective towards an epistemological perspective able to recognize the dynamism in the educational system and the complexity of the social system in which it is immersed. Key Words: Initial Teacher Formation- Professional Knowledge Construction- Practicum- Professional Reflection


Kybernetes ◽  
2015 ◽  
Vol 44 (1) ◽  
pp. 139-158
Author(s):  
Xiao Xue ◽  
Shufang Wang ◽  
Hao Chao

Purpose – The purpose of this paper is to provide strong theoretical and technical support for the dynamic evolution of service system in “Cluster Supply Chain”(CSC), which can deal with two kinds of context changes: the internal service component changes and the external customer requirement changes. Design/methodology/approach – A “feedback-based” evolution mechanism of service system for CSC is proposed in this study. By means of the feedback update of enterprise service’s Quality of Service (QoS) attribute and the adjustment of the assumed QoS evaluation model, the evolution of service system can be achieved to suit the dynamic market demands. Findings – Results of the study suggest: by means of the “feed-back” evolution mechanism of service system, the enterprises in CSC can handle the context changes effectively to maintain the optimized operation status. Practical implications – The implementation of evolution mechanism in service system can keep the effectiveness of enterprise service composition to face the frequent service component changes and the unpredictable market turbulence. Originality/value – This paper proposes a method to realize the autonomous evolution of service system in CSC, which can support the flexibility and adaptability of enterprise service composition in the changing environment.


2012 ◽  
Vol 442 ◽  
pp. 87-91
Author(s):  
Jian Chun Zhang ◽  
Hai Hui Shen

Traditional interactive software and its User Interface (UI) have many shortcomings, so it's hard to meet the needs of users. But the new personalized interface model has good expansibility as it's based on XML language. In addition, the separate storage of XML file and executable programs fully realize the separation of application logic and UI.


Author(s):  
Kang Mingtao ◽  
Zhang Yuliang ◽  
Jin Dapeng ◽  
He Yongcheng ◽  
Zhan Mingchuan ◽  
...  

Abstract Background The China Spallation Neutron Source (CSNS) accelerator consists of an 80 MeV H- LINAC, a 1.6 GeV rapid cycling synchrotron (RCS) and two beam transport lines. The uncontrolled beam may permanently damage the components or lead to very high residual radiation dose along the beam line. So the equipment protection must be deliberately designed and implemented. Purpose The machine protection system (MPS) protects components from being damaged by the beam. The response time requirement for the CSNS MPS is less than 20 ms, so the PLC (programmable logic controller) was adopted to implement the interlock logic. Methods The MPS was implemented as a two-tier architecture system, and developed through utilizing PLC and Experimental Physics and Industrial Control System (EPICS) software toolkits. The application logic was taken into careful consideration during the implementation stage. An embedded CPU module can function as an IOC accessing PLC I/O modules through the sequence CPU, with an embedded Linux operation system. Results The interlock logic and heartbeat functions were tested with all functions ok. Time consumption has been measured thoroughly since the important requirement, which is around 15 ms to stop the beam. Conclusions MPS was completed in Sep. 2017 and then put into operation. It has been operating smoothly for more than 3 years. MPS has played an important role in every stage of CSNS’s commissioning and operation and achieved high reliability during the user’s experiment operation. The accelerator recently runs stably with low equipment failure.


1997 ◽  
Vol 78 (2) ◽  
pp. 172-184 ◽  
Author(s):  
Arthur J. Frankel

The author states that the social work profession is not sufficiently involved with Head Start. Data from a representative sample of Head Start programs shows the minimal role professional social workers play with Head Start even when ample financial resources to hire BSWs or MSWs are available. Evidence suggests, however, that Head Start is open to increased professional social work involvement. The author presents reasons social work professionals are underrepresented in Head Start and recommendations for increasing professional involvement and influence. The author also discusses the history and current status of Head Start, including a thorough description of Head Start's social service component.


2021 ◽  
Vol 4 (2(112)) ◽  
pp. 6-17
Author(s):  
Vladimir Barannik ◽  
Serhii Sidchenko ◽  
Dmitriy Barannik ◽  
Sergii Shulgin ◽  
Valeriy Barannik ◽  
...  

Along with the widespread use of digital images, an urgent scientific and applied issue arose regarding the need to reduce the volume of video information provided it is confidential and reliable. To resolve this issue, cryptocompression coding methods could be used. However, there is no method that summarizes all processing steps. This paper reports the development of a conceptual method for the cryptocompression coding of images on a differentiated basis without loss of information quality. It involves a three-stage technology for the generation of cryptocompression codograms. The first two cascades provide for the generation of code structures for information components while ensuring their confidentiality and key elements as a service component. On the third cascade of processing, it is proposed to manage the confidentiality of the service component. The code values for the information components of nondeterministic length are derived out on the basis of a non-deterministic number of elements of the source video data in a reduced dynamic range. The generation of service data is proposed to be organized in blocks of initial images with a dimension of 16×16 elements. The method ensures a decrease in the volume of source images during the generation of cryptocompression codograms, by 1.14–1.58 times (12–37 %), depending on the degree of their saturation. This is 12.7‒23.4 % better than TIFF technology and is 9.6‒17.9 % better than PNG technology. The volume of the service component of cryptocompression codograms is 1.563 % of the volume of the source video data or no more than 2.5 % of the total code stream. That reduces the amount of data for encryption by up to 40 times compared to TIFF and PNG technologies. The devised method does not introduce errors into the data in the coding process and refers to methods without loss of information quality.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Fangzhou Zhu ◽  
Liang Liu ◽  
Simin Hu ◽  
Ting Lv ◽  
Renjun Ye

The widespread application of wireless communication technology brings great convenience to people, but security and privacy problems also arise. To assess and guarantee the security of wireless networks and user devices, discovering and identifying wireless devices become a foremost task. Currently, effective device identification is still a challenging issue, as device fingerprinting requires huge training datasets and is difficult to expand, and rule-based identification is not accurate and reliable enough. In this paper, we propose WND-Identifier, a universal and extensible framework for the identification of wireless devices, which can generate high-precision device labels (vendor, type, and product model) efficiently without user interaction. We first introduce the concept of device-info-related network protocols. WND-Identifier makes full use of the natural language features in such protocol messages and combines with the device description in the welcome page, thereby utilizing extraction rules to generate concrete device labels. Considering that the device information in the protocol messages may be incomplete or forged, we further take advantage of the application logic independence and stability of the device-info-related protocol, so as to build a multiprotocol text classification model, which maps the device to a known label. We conduct experiments in homes and public networks and present three application scenarios to verify the effectiveness of WND-Identifier.


Sign in / Sign up

Export Citation Format

Share Document