Filters








24,701 Hits in 3.5 sec

Java transactions for the Internet

M C Little, S K Shrivastava
1998 Distributed Systems Engineering  
In this paper we present the design and implementation of a standards compliant transactional toolkit for the Web.  ...  An important fault-tolerance technique is the use of atomic transactions for controlling operations on services.  ...  Acknowledgements The work reported here has been supported in part by a grant from UK Engineering and Physical Sciences Research Council (grant no. GR/L 73708).  ... 
doi:10.1088/0967-1846/5/4/003 fatcat:qojol77zpzhz7kci62pbio5igi

EAST JAVA ONLINE TRANSACTIONS: DEMAND SIDE ANALYSIS

Riska Dwi Astuti, Nadia Fazira
2019 Journal of Developing Economies  
In addition, mobile phones ownership also has a significant positive role in improving online transactions for the sale and purchase of goods services through the internet.  ...  This study aims to analyze the relationship of consumer characteristics on the expansion of online-based transactions in East Java.  ...  Decreasing quintile means that the percentage of internet usage for online transactions is relatively lower compared to other districts in East Java.  ... 
doi:10.20473/jde.v4i2.13048 fatcat:ufuxtbckafdqff7pb3vizkryba

The Criminal Law Enforcement Policy in Online Prostitution Treatment

Harjanto Mukti Eko Utomo, Umar Ma'ruf
2020 Law Development Journal  
According to the author, do research by interviewing members of the Central Java Police that Barriers to law enforcement against online prostitution in the Central Java Regional Police are as follows:  ...  facilities and facilities and for members should be given special training related to investigations into acts, online prostitution crime  ...  prostitution or prostitution using the internet or online media as a means of transaction for those prostitutes and those who want to use their services.  ... 
doi:10.30659/ldj.2.2.115-120 fatcat:ippkoovnsngxbozwazz64xandu

Does Cobol exist?

F.P. Coyle
2000 IEEE Software  
The Java security mechanisms can execute code over the Internet with clearly specified restrictions.  ...  Battles rage between Corba's Transaction Service, Sun's Java Transaction Service, and Microsoft's Transaction Server, as programmers scramble to absorb the terminology and nuances of rollback and the ACID  ... 
doi:10.1109/52.839205 fatcat:2o2hgjh2yzhvjkvdztdgalbvwq

BizBuilder — An E-Services Framework Targeted for Internet Workflow [chapter]

Raja Krithivasan, Abdelsalam Sumi Helal
2001 Lecture Notes in Computer Science  
BizBuilder addresses the issue of transactions in particular and facilitates managing both synchronous and longrunning E-services that can participate in workflows.  ...  In other words, the services offered by a business should be easily accessible by any consumer or business using the Internet infrastructure and standard protocols.  ...  The BizBuilder framework currently supports only Java objects; this support can be extended to include legacy systems and other object implementations like CORBA, COM etc.  ... 
doi:10.1007/3-540-44809-8_7 fatcat:j52jargjlrhrnbiozztspzsudy

DIGITALIZATION OF MICRO, SMALL & MEDIUM ENTERPRISES (MSMEs) IN EAST JAVA, INDONESIA

Muhammad Sri Wahyudi Suliswanto, Mochamad Rofik
2019 Muhammadiyah International Journal of Economics and Business  
This study attempts to provide an overview of the digitalization of MSMEs in East Java.  ...  Nevertheless, there is a significant positive effect between the ratio of online transactions and the management quality of digital marketing.  ...  For MSMEs, the Internet will reduce promotional costs and enlarge market reach at once.  ... 
doi:10.23917/mijeb.v2i1.9380 fatcat:auziez7d3bf6hjzh6feijdzooe

Securing e-business applications using smart cards

E.-M. Hamann, H. Henn, T. Schack, F. Seliger
2001 IBM Systems Journal  
As the Internet is used increasingly as a platform for business transactions, security becomes a primary issue for Internet applications.  ...  However, this traditional level of security is not sufficient for such sensitive business transactions on the Internet as payments and legally binding contracts.  ... 
doi:10.1147/sj.403.0635 fatcat:ncrub5ju7rgxziittpdwxvhtae

THE STRATEGY OF LOGISTICS ASSOCIATIONS IN FOLLOWING THE DEVELOPMENT OF E-COMMERCE

Sulasmiyati S., Fanani D., Erwin
2019 Eurasia: Economics & Business  
As for the data collection, primary data were collected from interviews with several informants while the secondary data were obtained from several related documents.  ...  On the other hand, ALFI has several strengths because East Java is one of the provinces which has the busiest logistics activities in Indonesia; East Java has a special relationship with the government  ...  Internet access speed. One of the main factors that affect someone's desire in e-commerce transactions is the speed of accessing the internet.  ... 
doaj:32bd13cfa48b4ff1b648cec1280a4c8a fatcat:3h3dkvc7yrfjvlf6wgd7zcz2c4

Low-cost System for Supply Chain Management [chapter]

K. Fürst, T. Schmidt
2001 Global Engineering, Manufacturing and Enterprise Networks  
In this paper, a complete concept for Internet Electronic Data Interchange (EDI) -a well-known buzzword in the area of logistics and supply chain management to enable the automation of the interactions  ...  This approach is based on Internet and XML, because the implementation of traditional EDI (e.g.  ...  for Java in the Web browser.  ... 
doi:10.1007/978-0-387-35412-5_18 fatcat:2spmz3oqb5fuxbqa36qedtnffe

The gateway security model in the Java Electronic Commerce Framework [chapter]

Theodore Goldstein
1997 Lecture Notes in Computer Science  
JavaSoft is using the Gateway to create a new integrated open platform for financial applications called Java Electronic Commerce Framework.  ...  This paper describes an extension to the current Java security model called the "Gateway" and why it was necessary to create it.  ...  It is very difficult to define the venue of Internet electronic commerce transactions. A transaction that is legal at the seller's location may be illegal at the buyer's location.  ... 
doi:10.1007/3-540-63594-7_90 fatcat:e24fubom25bgdfu5igva2v7wii

E-Commerce Security: No Silver Bullet [chapter]

Anup K. Ghosh
1999 Database Security XII  
Acknowledgments This work has been supported by the Advanced Technology Program of NIST under Cooperative Agreement # 70NANB7H3049.  ...  The truth is there is no silver bullet to e-commerce security. Securing the data transaction via encryption protocols provides privacy for data sent over the Internet.  ...  For this reason, the inventors of Java created a "sandbox" for Java applets in which Java applets may safely execute without posing risks to the user's security or privacy.  ... 
doi:10.1007/978-0-387-35564-1_1 fatcat:5ry5zyy3w5aerapptgmiltyeo4

Internet Banking integration within the banking system

Constantin Marian MATEI, Catalin Ionut SILVESTRU, Dragos Stefan SILVESTRU
2008 Informatică economică  
Internet Banking developed due to increasing demand of online banking transactions.  ...  For the Internet Banking applications, SOA proved to be the optimal architectural solution, for a smoth integration between banking services from the front-end to the back-end.This paper intend to offer  ...  IBM Websphere Message Queue Manager or JMS standard (Java Message Service) for Java application servers.  ... 
doaj:80cb8ad2e76e49ce83b55f2133d4bffd fatcat:22egz3i5fvfzbmx2ltpuqwxoo4

IBM's Enterprise Server for Java

I. F. Brackenbury, D. F. Ferguson, K. D. Gottschalk, R. A. Storey
1998 IBM Systems Journal  
The Java Transaction Service (JTS) is a Java form of the CORBA Object Transaction Service (OTS).  ...  ESJ environments for Java code. The newest envi- ronment, Enterprise JavaBeans, is designed specif- ically for high-volume transactional execution of JavaBeans in the enterprise.  ... 
doi:10.1147/sj.373.0323 fatcat:z3bfvi7zx5cfvihjsm3omb77ge

ITCP based Security Enhancement for IoT Devices in IPV6 Protocol

Shubhalika Dihulia, Tanveer Farooqui
2017 International Journal of Computer Applications  
For the simulation of proposed ITCP protocol used JAVA platform. Also compare the proposed result with different protocols.  ...  In the ITCP protocol TCP is used for link connection between two devices and UDP is used for the data sending.  ...  SIMULATION AND RESULT The proposed method is simulated on Java Net beans 8.2 that is known as java simulation. Java is important in the field of IoT protocol development.  ... 
doi:10.5120/ijca2017915759 fatcat:lzbt3e3s4bfxnhp3qt3nwaz2tq

Integration of Internet Technology to Support The Wayang Orang Ngesti Pandawa Business

Albertus Dwiyoga Widiantoro, Ridwan Sanjaya, Tjahyono Raharjo, A. Rachmat Djati Winarno, Hadiyanto, Maryono, Budi Warsito
2018 E3S Web of Conferences  
Internet technology, financial technology, website, social media integration, and government support is expected to increase the interest of people to attend the performances.  ...  This study examines the view of new students towards the Ngesti Pandawa wayang theatre. The results shows that young people are still interested in the wayang orang Ngesti Pandawa.  ...  Acknowledgment This research is funded by the Directorate of Higher Education through the University Superior Research scheme in 2018.  ... 
doi:10.1051/e3sconf/20187313013 fatcat:ijt4ihqr7nhbbegj6fhnyalhba
« Previous Showing results 1 — 15 out of 24,701 results