首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
IETF softwire unicast and multicast framework for IPv6 transition   总被引:2,自引:0,他引:2  
IPv6 protocol plays an important role in the next generation of Internet (NGI). It is expected that the elegant coexistence of IPv4 and IPv6 is the key point of IPv6 transition. To solve the transition problem, we propose a mesh unicast framework and a multicast framework in this paper. We describe two reference models for the mesh unicast framework, and put forward two potential solutions for the multicast framework. A Linux-based prototype is implemented for IPv4 over IPv6 scenario and a test bed is deployed with 8 nodes on CERNET2. The deployment demon- strates the advantages of the framework.  相似文献   

2.
As a sign of information age, Internet offers millions of information and makes the people‘s work easy. However, when the enterprise gets the information and communicates smoothly, it is at the risk that the interior technologic secret and the commerce secret is betrayed to the rival through the network. So it is necessary to aduit the information of the network. Network information aduit is the first step of network information aduit. This thesis provides a method of the network information monitor, and gives an effective network packet filters technology named BPF aiming at dealing with the large number of data on the network.  相似文献   

3.
A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.  相似文献   

4.
A major problem of mobile agents is their apparent mability to authenticate transactions in hostile environments,In this paper,a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent.in the scheme,a mobile agent can produce valid signature on website‘s bid(it means to transact a contact with the web site)on behalf of its customer ,without-revealing the customer‘s real private key.In addition,the anonymity of the customer is also achieved when its agent tansacts with the websites.Furthermore,the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center(AMC).Thererfore,the scheme is practical in the future elecronic commerce over Internet.  相似文献   

5.
Research on Next-Generation Internet Architecture   总被引:2,自引:1,他引:1       下载免费PDF全文
The primary problem during the evolvement of next-generation Internet is the contradiction between growing requirements for Internet and the insufficient development of network theory and technology. As the fundamental principles to guide the developing direction of Internet, the study of Internet architecture is always a focus in the research community. To address the core issue of network scalability, we propose multi-dimension scalable architecture of next-generation Internet, the main idea of which is to extend the single-dimension scalability of traditional Internet on interconnection to multi-dimension scalability of next-generation Internet. The multi-dimension scalability is composed of scale-scalability, performance-scalability, security-scalability, function-scalability, and service-scalability. We suggest five elements, namely, IPv6, authentic IPv6 addressing, scalable processing capacity of routers, end-to-end connectionless Quality-of-Service control, and 4over6 mechanism to realize the multi-dimension scalability. The current research results show that the multi-dimension scalable architecture composed of these five elements will bring great influence on next-generation Internet.  相似文献   

6.
An approach based on adaptive congestion control and adaptive error recovery with RS (Reed-Solomon) coding method is presented for efficient video transmission over the Internet. Featured by weighted moving average rate control and TCP-friendliness, AVSP, a novel adaptive video streaming protocol, is designed with adjustable rate control parameters so as to respond quickly to the QoS status fluctuation during video transmission over the Internet. Combined with congestion control policy, an adaptive RS coding error recovery scheme with variable parameters is presented to enhance the robustness of MPEG video transmission over the Internet with restriction to the total system bandwidth .  相似文献   

7.
To overcome the limitations of commercial CAD and hanbook form of knowledge expression,the Distributed Knowledge Information System(DKIS) for product design is proposed.The structure of DKIS and the key issues in its implementation are introduced;the method of knowledge store and transfer of DKIS is discussed.The mechanism of knowledge representation,acquisition and utilization,based on Internet network,is achieved.Based on the concept of function driven,integrated Artificial Neural Networks and Active Server Pages techniques,transplanting the trained ANN into DKIS system,a new method for retrieving knowledge in DKIS over Internet is achieved.Finally,a prototype of DKIS is developed to demonstrate the feasibility of the structure and constructional method of DKIS.The work provides a scheme for speed knowlege acquisition and shortens the cycle of product development.  相似文献   

8.
A formal model of fair exchange protocols   总被引:8,自引:2,他引:6  
1 Background Electronic commerce over open networks has been growing rapidly over the last dec- ade. Usually commercial transactions involve parties who mutually distrust each other, so protecting one legitimate party from another is as important as protecting legitimate parties from intruders. Therefore the fairness property of an exchange protocol is vital. Generally, a typical fair exchange protocol has a main protocol and several sub-protocols. It has a much bigger size than the classical…  相似文献   

9.
The paper discusses the concept and basic theory of MVC design pattern in detail. And J2EE technique system which is often used in the advance enterprise application is also introduced. Based on electronic commerce traditional application architecture, the MVC design pattern and J2EE technique are combined and a new electronic commerce application system architecture is put forward. The architecture improves the maintainability and reliability of system, and capability of repeat use in increased. Therefore the architecture will influence today's system technology of E-commerce strongly.  相似文献   

10.
By considering the interaction between Fowler-Nordheim tunneling injection theory and charge carriers transporting through the bulk, an electroluminescence model for organic single-layer diodes is presented. The expressions of the recombination current density, recombination efficiency and conductivity of the diodes are provided, which elucidate the controlling role of the electric field on mobility and recombination zone. The equilibrium of two opposite charge carriers injection and the cen-tral position of recombination zone are two important preconditions for reducing the leakage current. Space-charge-limited current occurs only over a certain high bias, meanwhile, the quantity of injection carriers increases over the transport capacity of the bulk.  相似文献   

11.
The article focuses on Internet economics and examines some of the more controversial and often misunderstood aspects of shopping on the Web, such as transaction security and the much maligned Magic Cookie. Knowing more about the technologies behind commercial Web transactions can help make the Web a less scary place to type in your credit card number. The Web was never designed to be a transaction oriented environment. The basic transport protocol of the Web-HTTP-is a stateless environment; when combined with TCP/IP's packet switched mechanics, it makes for one heck of a wild ride. Not only can you not connect to and maintain an ongoing session within a Web server, but you can't even maintain a continuous and uninterrupted packet stream with that server. HTTP guarantees that every link you click is a completely new and complete transaction with a beginning and an end, and TCP/IP ensures that every packet composing that brief connection is first accounted for and then immediately forgotten. This environment, while advantageous for some applications, is problematic for conducting online commerce. The difficulty imposed by the Web's stateless environment manifests itself in two primary areas: securing the transaction and payment, and tracking the customer's shopping session. A third but slightly less difficult obstacle is recognizing a customer when they return to a site at another time, which from a marketing perspective is very important. We look at each of these problems and how they are being overcome in today's online commerce environment  相似文献   

12.
Graham  L. 《Software, IEEE》1999,16(5):19-21
Practically overnight, the Internet has become a major commercial channel. Those of you who buy groceries at HomeGrocer.com, health care items at drugstore.com, and books at Amazon.com are sure to agree. The numbers confirm that commerce is booming on the Web. With hundreds of billions of dollars changing hands, the World Wide Web might just as well be called the Wild Wild West as far as trademarks are concerned. Although disorder and uncertainty were hallmarks of the Web only a few years ago, there is now a substantial and growing body of law that provides ample guidance for the proper use of trademarks on the Internet  相似文献   

13.
Today, any doubts about possibilities of significant profits over the Internet are a distant memory. Such has been the proliferation of Internet-based business on the public network. But electronic commerce has turned out to be more difficult to master than previously assumed. For many, ventures have been less lucrative than expected. The problem is that integrating business models with technology is a multifaceted and largely open question (Shaw, et al. 1997). How do businesses of various sizes and industries actually start their Internet activity and how do their business models change over time? More specifically, how do their different Internet strategies play out? This article is the result of a survey of the Internet strategies and business models of 280 companies that sell products and services on the public network. The results show that electronic commerce has penetrated companies of all sizes. Based on this survey it is apparent that while many companies have participated in electronic commerce for years, their business models are still in their infancy stages.  相似文献   

14.
Neumann  C. 《Computer》1996,29(4):91-92
For several years, electronic commerce has been a much-touted goal for the Internet. Not long ago, the Internet was used primarily for research, with access limited mainly to the university and research communities. But network service providers and commercial online services have opened it to a much larger user community. Many companies have set up corporate Web pages, and we have started to see credit cards and other monetary instruments used to place orders over the network. The Internet is increasingly becoming a venue for conducting the commerce previously carried out by other means, and for offering new commercial online services  相似文献   

15.
Ahuja  V. 《IT Professional》2000,2(3):61-63
Electronic commerce lets companies integrate internal and external business processes through information and communication technologies. Companies conduct these business processes over intranets, extranets and the Internet. E-commerce lets businesses reduce costs, attain greater market reach, and develop closer partner relationships. However, using the Internet as the underlying backbone network has led to new risks and concerns. Often, industry analysts cite trust and security as the main hurdles in growing e-commerce. The paper considers how companies seeking success in electronic commerce need to set their sights on providing security and building trust  相似文献   

16.
随着目前网上商务的发展,安全已变得越来越重要。网景公司开发出的安全套接字协议(Secure Sockets Layer Protocol,SSL)很好地实现了这一点,同时它也是在电子商务及网络安全通讯中使用的最为广泛的安全协议。然而,SSL协议本身还有一些不足和有待改进的地方,本文深入地研究分析了SSL协议的原理和存在的问题,给出了相应改进方案,并用模糊控制算法将这些改进方案应用于SSL协议中,模拟试验表明,改进的SSL协议具有明显的优点。  相似文献   

17.
The bloom of electronic commerce has changed the whole outlook of traditional trading behavior. Through the Internet, different business entities can now easily interact with each other and then have their transactions within a minimum time. However, the advanced hardware facilities for Internet infrastructure and the entrancing Web sites are not the only decisive factors to guarantee a successful business in the electronic market. To enable the transactions, the problems that ensue during the complicated activities in electronic commerce have to be resolved. This paper presents an agent-based system to support two types of activities most related to the decision-making process in the Internet commerce. The first part of our system is for interactive recommendation; and the second part, for automated negotiation. Experiments have been conducted to evaluate their corresponding performance and the results show the efficiency of the proposed system and its potential toward the future electronic market.  相似文献   

18.
基于ASP.NET的电子商务平台设计与实现   总被引:3,自引:0,他引:3  
电子商务是在Internet开放的网络环境下,采用电子形式开展的商务活动。这种新型的商业运营模式基于浏览器/服务器应用方式,实现了消费者的网上购物、商户之间的网上交易和在线电子支付。阐述了电子商务的系统结构,实现了电子商务的一般在线功能。同时详细描述了各个功能模块及所采用的关键技术,并对ASP.NET与CGI,PHP,JSP等Web技术进行比较。试验表明基于ASP.NET的程序设计使得该系统更易维护、更安全、更稳定。  相似文献   

19.
《Computer》1997,30(5):44-47
If CommerceNet realizes its vision, we might well see a new “ecology” of global Internet commerce, with buyers, sellers, and intermediaries forming extended trading communities. Launched in 1994 as a not-for-profit organization, CommerceNet (http://www.commerce.net) is dedicated to advancing electronic commerce, which is fast becoming synonymous with Internet commerce. The group's nearly 250 member companies seek solutions to technology issues, sponsor numerous industry pilots, and foster market and business development  相似文献   

20.
电子商务安全从整体上可分为计算机信息系统安全和商务交易安全两大类。本文从互联网环境中电子商务安全面临的威胁,目前主要采用的安全技术及存在的问题等方面论述了电子商务交易安全存在的问题,强调应从人-法律-网络技术等方面进行综合安全管理。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号