The Community for Technology Leaders
E-Commerce Technology for Dynamic E-Business, IEEE International Conference on (2004)
Beijing, China
Sept. 13, 2004 to Sept. 15, 2004
ISBN: 0-7695-2206-8
TABLE OF CONTENTS
Intellectual Property Protection in Networking Environments
Keynote Addresses

Science and Technology Challenges toward Business On Demand (PDF)

James T. Yeh , IBM China Research Laboratory, Beijing, China
pp. 2

Attacks and Countermeasures in System Security (PDF)

Jeffrey J. P. Tsai , University of Illinois, Chicago, IL
pp. 3

E-Government in China: Current Status, Strategies and Practice (PDF)

Jiajun Ning , Department of Public Technical Service, State Information Center
pp. 4
Service Oriented Technology

A System Dynamics Framework for Sense-and-Respond Systems (Abstract)

Markus Ettl , IBM T.J. Watson Research Center, Yorktown, New York
Lianjun An , IBM T.J. Watson Research Center, Yorktown, New York
J. J. Jeng , IBM T.J. Watson Research Center, Yorktown, New York
Jen-Yao Chung , IBM T.J. Watson Research Center, Yorktown, New York
pp. 6-13

Towards Architecture Model based Deployment for Dynamic Grid Services (Abstract)

Ling Lan , Science, Peking University, Beijing, China
Tiancheng Liu , Science, Peking University, Beijing, China
Hong Mei , Science, Peking University, Beijing, China
Meng Wang , Science, Peking University, Beijing, China
Gang Huang , Science, Peking University, Beijing, China
Liya Ma , Science, Peking University, Beijing, China
pp. 14-21

Efficient Interval Indexing for Content-Based Subscription E-Commerce and E-Service (Abstract)

Philip S. Yu , IBM T.J. Watson Research Center
Mark Mei , IBM T.J. Watson Research Center
Kun-Lung Wu , IBM T.J. Watson Research Center
Shyh-Kwei Chen , IBM T.J. Watson Research Center
pp. 22-29
Business Process and Modeling

A Semantic Publish/Subscribe System (Abstract)

Hui Lei , IBM T.J. Watson Research Center, Yorktown Heights NY
Liangzhao Zeng , IBM T.J. Watson Research Center, Yorktown Heights NY
pp. 32-39

EAML- Architecture Modeling Language for Enterprise Applications (Abstract)

Srinivas Thonse , Infosys Technologies Limited, Bangalore, India
Santonu Sarkar , Infosys Technologies Limited, Bangalore, India
pp. 40-47

Adaptive Fuzzy Approach to Estimate Supplier's Competitiveness in Open E-Bidding (Abstract)

Guanrong Chen , City University of Hong Kong
Simone K. F?chter , Universidade do sul do Brasil
Trung T. Pham , DIcentral Corporation
pp. 48-55
E-Commerce Experiences

The Business Model and Risk Control of Warehouse Financing in China (Abstract)

Zhao Wenyan , Xi'an Jiaotong University, P.R. of China
Feng Gengzhong , Xi'an Jiaotong University, P.R. of China
Yu Yang , Xi'an Jiaotong University, P.R. of China
Wang Simiao , Xi'an Jiaotong University, P.R. of China
pp. 58-65

Measuring Globalization of ICT Industries: Empirical Evidence across Six Economies of East Asia and Over Time (Abstract)

Feng-Jyh Lin , Feng Chia University, Taiwan
Yi-Min Chen , National University of Kaohsiung, Taiwan
pp. 66-73

Mining Web Transaction Patterns in Electronic Commerce Environment (Abstract)

Show-Jane Yen , Ming Chuan Univ., Taiwan
Min-Chi Hsieh , Ming Chuan Univ., Taiwan
Yue-Shi Lee , Ming Chuan Univ., Taiwan
Ghi-Hua Tu , Ming Chuan Univ., Taiwan
pp. 74-81
Trust Issues for Services

An Approach to Help Select Trustworthy Web Services (PDF)

Jia Zhang , Northern Illinois University, Chicago, IL
Liang-Jie Zhang , IBM T.J. Watson Research, Yorktown Heights, New York
Jen-Yao Chung , IBM T.J. Watson Research, Yorktown Heights, New York
pp. 84-91

Visibility and Measurability for Trust Management in Cooperative Business Operations (Abstract)

Malu Castellanos , Hewlett-Packard, Palo Alto, CA
Fabio Casati , Hewlett-Packard, Palo Alto, CA
Umeshwar Dayal , Hewlett-Packard, Palo Alto, CA
Ming-Chien Shan , Hewlett-Packard, Palo Alto, CA
pp. 92-99

An Extended RBAC Model for Web Services in Business Process (Abstract)

Peng Liu , Peking University, Beijing, China
Zhong Chen , Peking University, Beijing, China
pp. 100-107
E-Commerce Lessons

China-styled Certain Industry Circle Integration with Manufacturing Grid (Abstract)

Li Qing , Tsinghua University, Beijing
Zhou Jian , Tsinghua University, Beijing
Xu Dafeng , Tsinghua University, Beijing
pp. 110-113

A Study of the Self-Organization Modeling of Distributed Manufacturing Network (Abstract)

Linyan Sun , Xi'an Jiaotong University, P.R. China
Haiquan Li , Xi'an Shiyou University, P.R. China
Gang Li , Xi'an Jiaotong University, P.R. China
pp. 114-117

Articulating Autonomously Distributed Electronic Product Catalogues for Constructing Dynamic CONEX Net (Abstract)

David Chen , Griffith University, Australia
Chengzheng Sun , Griffith University, Australia
Jingzhi Guo , Griffith University, Australia
pp. 118-121

Support System of Advertising Distribution Contract for Media-Mix Strategy (Abstract)

Atsushi Yamada , Kyoto University, Japan
Hiroshi Hoshino , Kyoto University, Japan
Takashi Oseto , Kyoto University, Japan
Shinya Takami , Kyoto University, Japan
pp. 122-125

A New Idea of E-Learning: Establishing Video Library in University Network League (Abstract)

Lin Cai , Beijing University of Posts and Telecommunications, China
Yixian Yang , Beijing University of Posts and Telecommunications, China
Yafei Yang , Beijing University of Posts and Telecommunications, China
pp. 126-129

Business Models and Solution Architectures for SMB Financing in a Supply Chain Ecosystem (Abstract)

Jing Li , IBM China Research Lab
Peng Li , Xi'an Jiaotong University, P.R. China
Wei Sun , IBM China Research Lab
Dong Liu , IBM China Research Lab
Gengzhong Feng , Xi'an Jiaotong University, P.R. China
pp. 130-133
Web-Based Technology

The Design and Implementation of a Directory Based Wireless Network Operation Management System (Abstract)

Chao-Chi Huang , National Taipei University of Technology, Taiwan
Ing-Yi Chen , National Taipei University of Technology, Taiwan
Chen-Hsin Tsai , National Taipei University of Technology, Taiwan
pp. 136-141

Applying Personalized Annotation Mechanism to E-Documentation (Abstract)

Stephen J. H. Yang , National Central University
Irene Chen , National Kaohsiung First University of Science and Technology
Norman W. Y. Shao , National Kaohsiung First University of Science and Technology
Vincent M. Z. Du , National Central University
pp. 142-145

A Delay Based Backoff Scheme to Support M-Commerce Over Wireless Local Area Network (Abstract)

Weidong Kou , Xidian University, China
Yuxia Xiao , Xidian University, China
Nai'an Liu , Xidian University, China
Xiaohui Li , Xidian University, China
Xiang Sun , Xidian University, China
pp. 146-149

A New Architecture for Dynamic E-Business Database Interoperability (Abstract)

Ben Soh , La Trobe University, Bundoora, VIC, Australia
Omar Khadeer Hussain , La Trobe University, Bundoora, VIC, Australia
pp. 150-153

Dynamic Web Service Invocation Based on UDDI (Abstract)

Gang Zhou , Beihang University, Beijing
JianJun Yu , Beihang University, Beijing
pp. 154-157

Client-Side Deep Web Data Extraction (Abstract)

Angel Vi? , University of A Coru?a, Spain
Manuel ?lvarez , University of A Coru?a, Spain
Juan Raposo , University of A Coru?a, Spain
Alberto Pan , University of A Coru?a, Spain
pp. 158-161
Supply Chain Issues

An Approach to Security and Privacy of RFID System for Supply Chain (Abstract)

Jun Shen , IBM China Research Lab, Beijing, China
Jian Huang , IBM China Research Lab, Beijing, China
Hao Wang , IBM China Research Lab, Beijing, China
Zhe (Alex) Xiang , IBM China Research Lab, Beijing, China
Song Song , IBM China Research Lab, Beijing, China
Xingxin (Grace) Gao , IBM China Research Lab, Beijing, China
pp. 164-168

Using Temporal Logics for Modeling and Analysis of Workflows (Abstract)

Yuan Wang , Tsinghua University, Beijing, China
Yushun Fan , Tsinghua University, Beijing, China
pp. 169-174

The Simulation of Service Supply Chain Formation Based on Mobile Agent's Searching (Abstract)

Dalu Zhang , Tongji University, China
Zhe Yang , Tongji University, China
Jian Xu , Tongji University, China
pp. 175-178
Formal Models and Verification

Towards Formal Verification of UML Diagrams Based on Graph Transformation (Abstract)

Yuan Wang , Tsinghua University, Beijing China
Xinxin Bai , Tsinghua University, Beijing China
Wei Ding , IBM China Research Lab, Beijing China
Yushun Fan , Tsinghua University, Beijing China
Yu Zhao , Tsinghua University, Beijing China
Hong Cai , IBM China Research Lab, Beijing China
pp. 180-187

XML Constraints Preservation in Relational Schema (Abstract)

Yunsheng Liu , Huazhong University of Science & Technology
Hao Zhong , Huazhong University of Science & Technology
Yi Wang , Huazhong University of Science & Technology
pp. 188-195

An Approach to XML-Based Knowledge Representation and Its Application in Dynamic E-Business (Abstract)

Xiao-Feng Ji , Tsinghua University, Beijing, PR. China
Hua Zhu , Tsinghua University, Beijing, PR. China
Jun-Hua Xu , Tsinghua University, Beijing, PR. China
pp. 196-199
Security Issues

A Micro-payment Scheme for Multiple-Vendor in M-Commerce (Abstract)

Jianfeng Ma , Xidian University, China
Ninghong Wang , Shanxi Institute of Economic Management, China
Jianming Zhu , Xidian University, China
pp. 202-208

The HMM-Based Model for Evaluating Recommender's Reputation (Abstract)

Vir V. Phoha , Louisiana Tech University, Ruston, LA
Weihua Song , Louisiana Tech University, Ruston, LA
Xin Xu , Louisiana Tech University, Ruston, LA
pp. 209-215

Zero-Knowledge Proofs of Identity Based on ELGAMAL on Conic (Abstract)

Min Liu , Tongji University Shanghai
Dalu Zhang , Tongji University Shanghai
Zhe Yang , Tongji University Shanghai
pp. 216-223
Web Service Integration

Quality Evaluation of Web Services (Abstract)

Kunhuang Huarng , Feng Chia University, Taiwan
Yi-Min Chen , University of Kaohsiung, Taiwan
Shu-Ming Lin , Shih Chien University, Taiwan
Feng-Jyh Lin , Feng Chia University, Taiwan
pp. 226-233

Composing Web services Dynamically and Semantically (Abstract)

Ning Gu , Fudan University, ShangHai, China
Jiamao Liu , Fudan University, ShangHai, China
Juntao Cui , Fudan University, ShangHai, China
pp. 234-241

SLA Representation and Applications in the NGI Service Management (Abstract)

Zhang Ruo-ying , State Key Lab of Networking and Switching, China
Qui Xue-Song , State Key Lab of Networking and Switching, China
Meng Luo-ming , State Key Lab of Networking and Switching, China
pp. 242-245
Security Issues II

Work-Flow Based Multi-Domain Certificate in E-Commerce (Abstract)

Zhiyi Fang , Jilin University, Changchun, China
Zhuang Liu , Jilin University, Changchun, China
Jing Zhang , Jilin University, Changchun, China
Yong Feng , Jilin University, Changchun, China
pp. 248-252

Design of Single Sign-On (Abstract)

Gang Zhao , Technology of Shanghai Jiao Tong University
Dong Zheng , Technology of Shanghai Jiao Tong University
Kefei Chen , Technology of Shanghai Jiao Tong University
pp. 253-256

A Proxy Signature Scheme with Proxy Signer's Privacy Anonymity (Abstract)

Guozhen Xiao , Xidian University, P.R. China
Weidong Kou , Xidian University, P.R. China
Xiaotong Fu , Xidian University, P.R. China
pp. 257-260

An Improved Mutual Authentication Scheme for Smart Card Secure Messaging (Abstract)

Lanjun Dang , Xidian University, P. R. China
Yuxia Xiao , Xidian University, P. R. China
Weidong Kou , Xidian University, P. R. China
pp. 261-264
Semantic Web and Services

Resource Association Discovery in Semantic Web (Abstract)

Li Juanzi , Tsinghua University
Tang Jie , Tsinghua University
Wang Kehong , Tsinghua University
Liang Bangyong , Tsinghua University
pp. 266-269

An Ontology Modeling Method in Semantic Composition of Web Services (Abstract)

Yujin Wu , Fudan University, ShangHai, China
Ning Gu , Fudan University, ShangHai, China
Jiamao Liu , Fudan University, ShangHai, China
Juntao Cui , Fudan University, ShangHai, China
pp. 270-273

Heterogeneity Resolution based on Ontology in Web Services Composition (Abstract)

Yin Nan , Northeastern University, Shenyang
Yu Ge , Northeastern University, Shenyang
Shen Derong , Northeastern University, Shenyang
Nie Tiezheng , Northeastern University, Shenyang
pp. 274-277

Knowledge Sharing and Web-Based Knowledge-Sharing Platform (Abstract)

Qiao Fei , Tongji University, Shanghai, China
An Fengjie , Tongji University, Shanghai, China
Chen Xin , Tongji University, Shanghai, China
pp. 278-281

A New Method in Multi-Issue Negotiation (Abstract)

Jie Yang , Peking University, Beijing
Lei Wang , Peking University, Beijing
Ning Zhang , Peking University, Beijing
pp. 282-285
Peer to Peer Computing

Maze: A Social Peer-to-Peer Network (Abstract)

Han Jinqiang , Peking University Beijing, China
Li Xiaoming , Peking University Beijing, China
Chen Hua , Peking University Beijing, China
Yang Mao , Peking University Beijing, China
Deng Haiqing , Peking University Beijing, China
pp. 290-293

Granary: Architecture of Object Oriented Internet Storage Service (Abstract)

Ming Li , Tsinghua University, P. R. China
Weimin Zheng , Tsinghua University, P. R. China
Jinfeng Hu , Tsinghua University, P. R. China
pp. 294-297

A New Layered P2P Architecture with Efficient Resource Location Strategy (Abstract)

Chao Zhang , Huazhong University of Science and Technology, China
Xiangzhou Guo , Huazhong University of Science and Technology, China
Quan Yuan , Huazhong University of Science and Technology, China
Hai Jin , Huazhong University of Science and Technology, China
pp. 298-301

Trust Based Incentive in P2P Network (Abstract)

HuaiMin Wang , Nation University of Defense Technology
Wen Dou , Nation University of Defense Technology
YangBin Tang , Nation University of Defense Technology
pp. 302-305

An Interest Group Model for Content Location in Peer-to-Peer Systems (Abstract)

Zhao-Qing Jia , Shanghai JiaoTong University, China
Guang-Tao Xue , Shanghai JiaoTong University, China
Jin-Yuan You , Shanghai JiaoTong University, China
pp. 306-309

P2P Research and Reality: Some Preliminary Thoughts (Abstract)

Zheng Zhang , Microsoft Research Asia
pp. 310-313

Efficient Peer-to-Peer Overlay Construction (Abstract)

Lionel M. Ni , The Hong Kong University of Science and Technology
Yunhao Liu , The Hong Kong University of Science and Technology
pp. 314-317

PeerView: Query Processing Based on Views over Collaborative Peers (Abstract)

Weining Qian , Fudan University
Aoying Zhou , Fudan University
Tian Xia , Fudan University
pp. 318-321
Business Transformation Solution

The Rise of the Model-Driven Enterprise (Abstract)

David Cohn , IBM Research, Watson Research Center, Hawthorn NY
Markus Stolze , IBM Research, Watson Research Center, Hawthorn NY
pp. 324-327

Realizing Business Components, Business Operations and Business Services (Abstract)

Anil Nigam , T.J. Watson Research Center, Yorktown Heights, NY
David Flaxer , T.J. Watson Research Center, Yorktown Heights, NY
pp. 328-332

Business Process Simulation with IT Depth (Abstract)

Akio Koide , IBM Japan Ltd.
Bala Ramachandran , IBM T.J. Watson Research Center
Makoto Kano , IBM Japan Ltd.
Te-Kai Liu , IBM T.J. Watson Research Center
pp. 333-336

A Sense-and-Respond Approach to Business Transformation (Abstract)

Paul Huang , IBM Watson Research Center, Yorktown, NY
Shubir Kapoor , IBM Watson Research Center, Yorktown, NY
Steve Buckley , IBM Watson Research Center, Yorktown, NY
pp. 337-340

Real-Time Business Process Performance Management (Abstract)

Yushun Fan , Tsinghua Univ., Beijing, China
Xinxin Bai , Tsinghua Univ., Beijing, China
pp. 341-344

Pricing Strategies for Information Products: A Review (Abstract)

Wang Kanliang , Xi'an Jiaotong University, China
pp. 345-348

Business Design for an On Demand Business Enterprise (Abstract)

Hong Cai , IBM China Research Lab, China
LiHua Tang , IBM China Research Lab, China
Ying Huang , IBM Watson Research Center, Yorktown Heights, NY
pp. 349-352

Demand Flow Network (Abstract)

Bo Liu , Xi'an Jiaotong University, P.R. China
Linyan Sun , Xi'an Jiaotong University, P.R. China
Xiting Wu , Xi'an Jiaotong University, P.R. China
pp. 353-356
Intellectual Property Protection in Networking Environments

On Public and Private Rights in Digital Copyrights - A Legislative Perspective (Abstract)

Qing Yang , Dongbei University of Finance & Economics, China
Xianqiang Zheng , Dongbei University of Finance & Economics, China
pp. 358-361

Intellectual Property Protection for E-Business Methods (Abstract)

Yahong Li , the University of Hong Kong
pp. 362-365

The Value of a University-based Content Provider: A Case Study of SunnyNet (Abstract)

Feng-Jyh Lin , Feng Chia University, Taiwan
Kunhuang Huarng , Feng Chia University, Taiwan
pp. 370-372
Grid Computing

Web Services Security in Data Service Delivery Platform for Telecom (Abstract)

Xiulan Yu , IBM China Research Laboratory
Xiaoyan Chen , IBM China Research Laboratory
Xiaocheng Ding , China Mobile R&D Center
Bin Zhou , China Mobile R&D Center
Bing Wei , China Mobile R&D Center
Xing Fang , IBM China Research Laboratory
pp. 374-377

ShanghaiGrid: Services to the People (Abstract)

Minglu Li , Shanghai Jiao Tong University, China
pp. 378-381

An Efficient Web Services Based Approach to Computing Grid (Abstract)

Weimin Zheng , Tsinghua University, Beijing, P.R. China
Ming Chen , Tsinghua University, Beijing, P.R. China
Guangwen Yang , Tsinghua University, Beijing, P.R. China
Baoyin Zhang , Tsinghua University, Beijing, P.R. China
Ruojie Ma , Tsinghua University, Beijing, P.R. China
Shucheng Liu , Tsinghua University, Beijing, P.R. China
Yongwei Wu , Tsinghua University, Beijing, P.R. China
Meizhi Hu , Tsinghua University, Beijing, P.R. China
pp. 382-385

Author Index (PDF)

pp. 386-389
92 ms
(Ver )