SMAP based Security Service Methods for Mobile RFID Business Application

2010 ◽  
Vol 11 (2) ◽  
pp. 295-315
Author(s):  
박남제
2013 ◽  
Vol 380-384 ◽  
pp. 2451-2454 ◽  
Author(s):  
Gui Fen Zhao ◽  
Ying Li ◽  
Li Ping Du ◽  
Jian Wei Guo

With the increasing amount of online shoppers, the security for E-Business becomes more important. Security middleware is one of the methods to achieve secure E-Business application. A security middleware based on smart card and combined secret key is proposed for mobile users and PC users. The security components are developed on the basis of cipher service provide by smart cards, encryption cards and combined secret key method, and provide security service interfaces based on J2EE. The middleware is proved valid for protecting the secrecy and integrity of order information during payment test.


2013 ◽  
pp. 38-53
Author(s):  
Nam Vu Hoang ◽  
Anh Truong Tuan ◽  
Nghia Nguyen Ke

This paper uncovers dimensions of family influence on private small business in Vietnam. Although the F-PEC scale, which comprises three subscales for power, experience and culture dimensions of family influence, has been validated in the literature, application of the scale in an Asian context, like Vietnam, may face challenges due to context differences. The study modified the original scale based on qualitative findings from five interviews with entrepreneurs and comments on the scale from business scholars. Data from a survey of 143 entrepreneurs were used for EFA, resulting in four factors. And CFA proves fitness of the measurement model of the four-factor structure to the data, in which two dimensions regarding the cultural aspect were confirmed.


2018 ◽  
Vol 5 (1) ◽  
pp. 47-55
Author(s):  
Florensia Unggul Damayanti

Data mining help industries create intelligent decision on complex problems. Data mining algorithm can be applied to the data in order to forecasting, identity pattern, make rules and recommendations, analyze the sequence in complex data sets and retrieve fresh insights. Yet, increasing of technology and various techniques among data mining availability data give opportunity to industries to explore and gain valuable information from their data and use the information to support business decision making. This paper implement classification data mining in order to retrieve knowledge in customer databases to support marketing department while planning strategy for predict plan premium. The dataset decompose into conceptual analytic to identify characteristic data that can be used as input parameter of data mining model. Business decision and application is characterized by processing step, processing characteristic and processing outcome (Seng, J.L., Chen T.C. 2010). This paper set up experimental of data mining based on J48 and Random Forest classifiers and put a light on performance evaluation between J48 and random forest in the context of dataset in insurance industries. The experiment result are about classification accuracy and efficiency of J48 and Random Forest , also find out the most attribute that can be used to predict plan premium in context of strategic planning to support business strategy.


2020 ◽  
Vol 23 (11) ◽  
pp. 1291-1312
Author(s):  
N.V. Zyleva

Subject. This article discusses the practice of ensuring the economic security of oil and gas companies operating under the terms of production sharing agreements, where minerals are the object of security. Objectives. The article aims to justify the need to apply professional judgment in the organization of reliable accounting of minerals, explored and extracted under the terms of the production sharing agreement implementation, to avoid various risks to the entity's economic security. Methods. For the study, I used the methods of deduction and modeling. Results. The article presents proposals to arrange accounting of intangible exploration assets (geological information on mineral reserves) and finished products (the part of the extracted minerals owned by the investor and the part owned by the State). Conclusions. As strategic minerals, oil and gas are the targets of various economic risks. Professionals familiar with the specifics of accounting operations in the implementation of the production sharing agreement should be prepared to prevent these risks. The results obtained can be used to design accounting policies and develop local regulations on the tasks and functions of the economic security service of the organization implementing the production sharing agreement.


Author(s):  
Ilia Pavlovich Mikhnev ◽  
Svetlana Vladimirovna Mikhneva

The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.


2013 ◽  
Vol 33 (5) ◽  
pp. 1350-1352
Author(s):  
Peng LIU ◽  
Changhong ZHANG ◽  
Qingyu OU

Sign in / Sign up

Export Citation Format

Share Document