View Sample PDF

185
Chapter 11
Electronic Procurement Systems
ABSTRACT
As elements that constitute electronic procurement systems, anonymous auction, object delivery, and
object monitoring systems are developed based on ITLs, anonymous tags and anonymous memories,
respectively. The developed anonymous auction system enables entities to securely sell and/or buy their
articles without disclosing their identities, and the anonymous object delivery system enables them to
send or receive their articles to or from other entities also without disclosing their identities. The object
monitoring system monitors running states of objects (e.g. home appliances) so that they can be used
efficiently, safely, and environmentally friendlily while preserving privacies of their users. It also detects
dishonest users (e.g. that discords their objects illegitimately) without invading privacies of honest users. Here, anonymous memories used in the monitoring system are memory sections by which users can
securely and efficiently maintain their data without disclosing their identities.
INTRODUCTION
In this chapter, auction, object delivery and object
monitoring systems are developed as components
of electronic procurement (e-procurement) systems, in which people connected by networks sell
or buy articles, transportation service providers
deliver articles to their buyers, and monitoring
stations remotely monitor running states of articles
such as home appliances to enable individual
users to use them efficiently, safely, and environmentally friendlily. Here, although this kind of
e-procurement systems not only make our societies efficient, convenient and safe but also enable
effective and efficient recycling of products and
materials, to encourage more people to accept these
systems, privacies of individual sellers, buyers
or users involved must be preserved. Therefore,
anonymous e-procurement systems supported
by security and service components discussed in
Section 2 play important roles.
DOI: 10.4018/978-1-4666-1649-3.ch011
Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Electronic Procurement Systems
Figure 1 depicts the overall configuration of
the anonymous e-procurement system (Tamura,
2008). In the figure, participants sell or buy articles
to or from other participants, and among the participants, some of them sell or buy articles without
disclosing their identities and in these cases payments are carried out through anonymous credit
card systems discussed in the previous chapter,
but some others (e.g. established manufacturers)
sell or buy articles while disclosing their exact
identities. Here, an anonymous auction mechanism is one of schemes in which people sell and
buy articles without disclosing their identities.
Then once articles are bought by buyers, buyers
e.g. auction winners, receive articles through
anonymous object delivery systems from sellers
(they may be also anonymous) without disclosing
their identities, and monitoring stations monitor
running states of articles such as home appliances
while preserving privacies of their owners or users.
When monitoring stations detect that the articles
are used inadequately they warn the anonymous
users of the dangers, or when the articles are
discarded illegitimately they identify the liable
users without invading any privacy of other users.
ANONYMOUS AUCTION SYSTEMS
Although there are many kinds of auction protocols
this section discusses 2 of them i.e. English and
Vickrey auction schemes (Yokoo, 2006). Both
English and Vickrey auction schemes consist
of sellers S1, S2, ---, SM, buyers B1, B2, ---, BN,
auctioneer A and BBs (bulletin boards) as shown
in Figure 2. In the figure, each seller Sj brings its
article to auctioneer A, A conducts auctions, in
which buyers B1, B2, ---, BN bid prices to buy the
article brought by Sj, and auction results and if necessary states of the auction processes are disclosed
in BBs. Here, when auctions are anonymous each
Bh can make bids and pay for its winning articles
without disclosing its identity to others including
auctioneer A and seller Sj that had brought the
article. Also, each seller Sj can bring its articles
and be paid for them while concealing its identity
from others. Here, anonymous networks enable
sellers and buyers to access the auction system
without disclosing their identities, anonymous
credit card systems enable anonymous buyers and
sellers to conduct their payment processes, and
anonymous object delivery systems enable sellers
and buyers to bring their owning articles and to
Figure 1. Configuration of anonymous e-procurement system
186
32 more pages are available in the full version of this document, which may
be purchased using the "Add to Cart" button on the publisher's webpage:
www.igi-global.com/chapter/electronic-procurement-systems/66342
Related Content
Financial Early Warning System for Risk Detection and Prevention from Financial Crisis
Nermin Ozgulbas and Ali Serhan Koyuncugil (2011). Surveillance Technologies and Early Warning
Systems: Data Mining Applications for Risk Detection (pp. 76-108).
www.irma-international.org/chapter/financial-early-warning-system-risk/46806/
Advanced Security Incident Analysis with Sensor Correlation
Ciza Thomas and N. Balakrishnan (2012). Situational Awareness in Computer Network Defense:
Principles, Methods and Applications (pp. 302-319).
www.irma-international.org/chapter/advanced-security-incident-analysis-sensor/62388/
The Social Organization of a Criminal Hacker Network: A Case Study
Yong Lu (2009). International Journal of Information Security and Privacy (pp. 90-104).
www.irma-international.org/article/social-organization-criminal-hacker-network/34061/
An Efficient Intrusion Alerts Miner for Forensics Readiness in High Speed Networks
Aymen Akremi, Hassen Sallay and Mohsen Rouached (2014). International Journal of Information Security
and Privacy (pp. 62-78).
www.irma-international.org/article/an-efficient-intrusion-alerts-miner-for-forensics-readiness-inhigh-speed-networks/111286/
Server Hardening Model Development: A Methodology-Based Approach to Increased System
Security
Doug White and Alan Rea (2009). Cyber Security and Global Information Assurance: Threat Analysis and
Response Solutions (pp. 319-342).
www.irma-international.org/chapter/server-hardening-model-development/7423/