JOURNAL OF NETWORKS (JNW)
ISSN : 1796-2056
Volume : 4 Issue : 4 Date : June 2009
Special Issue: Recent Advances in Electronic Commerce and Security & Web Information
Systems and Applications - Track on Networks
Guest Editors: Jian Shu, Fei Yu, Chin-Chen Chang, Limin Sun, and Guangxue Yue
Jian Shu, Fei Yu, Chin-Chen Chang, Limin Sun, and Guangxue Yue
Full Text: PDF (525 KB)
This special issue comprises of nine selected papers from the International Symposium on
Electronic Commerce Security (ISECS 2009), Nanchang, China, 22-24 May 2009. The conference
received 1050 paper submissions from 19 countries and regions, of which 487 were selected for
presentation after a rigorous review process. From these 487 research papers, through two rounds
of reviewing, the guest editors selected twelve as the best papers on the Computers track of the
Conference. The candidates of the Special Issue are all the authors, whose papers have been
accepted and presented at the ISECS 2009 and WISA 2009, with the contents not been published
The ISECS 2009 and WISA 2009 are sponsored by Nanchang HangKong University, China,
Peoples' Friendship University of Russia, Nanchang University (China), Jiangxi Normal University
(China), Wuhan University (China), National Chung Hsing University (Taiwan), Institute of Software,
Chinese Academy of Sciences, Sichuan University (China), and Jiaxing University (China).
Technical Co-Sponsors of the conference are IEEE, IEEE Computer Society, and IEEE Computer
Society Technical Committee on E-Commerce.
“Dynamic Pricing Strategy of Provider with Different QoS Levels in Web Service”, by Lean Yu,
Shouyang Wang, Guowei Hua, Gang Xie, and Jinlong Zhang, proposes a new dynamic pricing
model to consider order cancellation ration and different QoS levels for maximizing provider revenue.
“Model of Controlling the Hubs in P2P Networks”, by Yuhua Liu, Chun Yang, Kaihua Xu, Naixue
Xiong, proposes a new method to avoid generating the hubs in the networks by controlling the
logical topology structure of P2P networks, and this controlling method can enhance the anti-
vulnerability of P2P networks and ensure the networks develop continually and healthily.
“Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear
Analysis Model of Delay”, by Yao Ye, Cai Wandong, proposes a interior link delay reference
algorithm of Ad Hoc network on the basis of End-to-End measurement method. And resolved the
problem of interior link delay inference through computing the solution space for the non-
homogenous linear equations based on linear analysis model of delay.
“Model-based Vulnerability Analysis of IMS Network”, by Dong Wang, Chen Liu, proposes a
comprehensive vulnerability analysis model of IMS network, and makes a systematic analysis about
the security objectives, assets, weaknesses, threats and other attributes of IMS network by using
“Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols”, by
Tianjie Cao, Tao Quan, Bo Zhang, proposes that Kwon and Lee’s protocols and Zhu et al.’s protocol
are still vulnerable to server-compromise impersonation attacks and a malicious server can
eavesdrop the communication between the two clients.
“Ubiquitous Commerce: Theories, technologies, and applications” by Liyi Zhang, Qihua Liu and
Xinjian Li, proposes a suitable framework and organize the u-commerce research under the
proposed classification scheme. The current situation outlined by the scheme has been addressed
by exploratory and early phase studies.
“A United Access Control Model for Systems in Collaborative Commerce”, by Han Ruo-Fei, Wang
Hou-Xiang, Xiao Qian, Jing Xiao-Pei, and Li Hui, proposes the existing access control models and
propose a united access control model, adopting some useable ideas into it. The proposed model
is aimed to control privileges of internal functions and integrate them into service, establish rules for
“SWSCF: A Semantic-based Web Service Composition Framework”, by Jianqiang Hu,Juanzi Li,
Zhiyong Zeng, proposes a semantic-based Web services composition framework SWSCF which
exhibits flexibility to integrate services in terms of application domain semantics and dynamic
“The Social Network Mining of BBS”, by Lixin Zhou, Jichang Ding, Yi Wang, Bowen Cheng, Fei Cao,
analyze every useful message during their interaction through BBS to mine what kinds of attitudes
they show to others, and also get some personal information using data mining technology, to
establish the social network, to find out the key figures who are the more active or important BBS
users than others.
We are particularly grateful to Guangnan Ni, Chin-Chen Chang, Jen-Yao Chung, Ben M. Chen, and
Dongfen Yuan for accepting our invitation to deliver invited talks at this year’s conference. We wish to
thank the Nanchang HangKong University, China for providing the venue to host the conference. In
particular, we would like to acknowledge School of Computing, Nanchang HangKong University,
China, who has worked throughout the year in preparation for this conference. We would like to take
this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and
for their valuable contributions. We wish to express our deepest gratitude to the program committee
members for their help in selecting papers for this issue and especially the referees of the extended
versions of the selected papers for their thorough reviews under a tight time schedule. Last, but not
least, our thanks go to the Editorial Board of the Journal of Networks for the exceptional effort they
did throughout this process.
In closing, we sincerely hope that you will enjoy reading this special issue.
Special Issue, Electronic Commerce, Security, Web Information Systems