Abstract
E-business applications are implemented for performing services of user transactions. Analysis performance of customer preferences can be enhanced based on E-business structure and predefined formula patterns. Linear temporal logic (LTL) provides multiple formula patterns for obtaining better query of user requirements. Protecting and verifying users’ preferences and transactions are major concerns for enhancing E-business applications. This paper presents a design of a secured B2C and G2C E-business framework based on 3D secure mechanism. Advanced formula patterns are applied to the secured E-business structure for enhancing analysis performance and predicting users’ behavior. Enhanced web server logs are generated and optimized with an authentication algorithm to record and secure infinite traces of event actions. The secured E-business framework is implemented for optimizing key metrics of user behavior and enhancing business analysis and user insights. Experimental results are conducted for displaying the efficiency for the enhanced web server logs and flag parameter algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ciarniene, R., Stankeviciute, G.: Theoretical framework of E-Business competitiveness. In: International Scientific Conference of Economics and Management, Procedia - Social and Behavioral Sciences, Elsevier, vol. 123, pp. 734–739 (2015)
Chao, K.: E-services in E-business engineering. J. Electron. Comm. Res. Appl. 16(2), 77–81 (2016). ELSEVIER
Basu, A., Muylle, S.: Assessing and enhancing E-Business processes. J. Electron. Comm. Res. Appl. 10(4), 437–499 (2011)
Saha, G., Desai, M., Ghosh, A., Saha, N.: Digital signature modeling in E-business. In: IEEE International Conference on E-business Engineering, pp. 350–354 (2014)
Ping, G.: Analysis the application of E-business for the tourism enterprises’ performance evaluation in China. J. Energy Procedia 5, 849–854 (2011). ELSEVIER
Ahrens, A., Zascerinska, J.: A comparative study of engineering and business students’ attitude to E-business application. In: IEEE International Conference on E-Business, pp. 31–38 (2014)
Carmona, C.J., Ramirez, S., Torres, F., Bernel, E., Del Jesus, M.J., Garcia, S.: Web usage mining to improve the design of an E-commerce website: OrOliveSur.com. J. Expert Syst. Appl. 39, 11243–11249 (2012)
Su, Q., Chen, L.: A method for discovering clusters of E-commerce interest patterns using click-stream data. J. Electron. Comm. Res. Appl. 14(1), 1–13 (2015). ELSEVIER
Hemapriya, A., Bhuvaneswari, M., Muneeswaran, K.: Reconstruction of user sessions from web server log. In: IEEE International Conference on Computing and Communication Technologies, pp. 37–42 (2015)
Ahrens, A., Zascerinska, J.: A framework for selecting sample size in educational research on E-Business application. In: IEEE International Conference on E-Business, pp. 39–46 (2014)
Sergio, H., Alvarez, P., Fabra, J., Ezpeleta, J.: Analysis of users’ behavior in structured E-commerce websites. IEEE Trans. Access J. 5, 1–17 (2017)
Maggi, F.M., Bose, R.P.J.C., van der Aalst, W.M.P.: Efficient discovery of understandable declarative process models from event logs. In: Ralyté, J., Franch, X., Brinkkemper, S., Wrycza, S. (eds.) CAiSE 2012. LNCS, vol. 7328, pp. 270–285. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31095-9_18
Zugal, S., Pinggera, J., Weber, B.: The impact of testcases on the maintainability of declarative process models. In: Halpin, T., Nurcan, S., Krogstie, J., Soffer, P., Proper, E., Schmidt, R., Bider, I. (eds.) BPMDS/EMMSAD -2011. LNBIP, vol. 81, pp. 163–177. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21759-3_12
Rezaei, R., Chiew, T., Lee, S.: A review on E-business interoperability frameworks. J. Syst. Softw. 93, 199–216 (2014). ELSEVIER
Mostafa, A.M., Alroudhan, J., Hassan, M.M.: LTL formula patterns for enhancing the performance analysis for e-business structure. J. Theor. Appl. Inf. Technol. 97(8), 2429–2439 (2019)
Alvarez, P., Fabra, J., Hernandez, S., Ezpeleta, J.: Alignment of teacher’s plan and students’ use of LMS resources: analysis of moodle logs. In: IEEE International Conference on Information Technology Based Higher Education and Training, pp. 1–8 (2016)
Burattin, A., Cimitile, M.: Online discovery of declarative process models from event streams. IEEE Trans. Serv. Comput. 8(6), 1–14 (2015)
Poggi, N., Muthusamy, V., Carrera, D., Khalaf, R.: Business process mining from E-Commerce web logs. In: Daniel, F., Wang, J., Weber, B. (eds.) BPM 2013. LNCS, vol. 8094, pp. 65–80. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40176-3_7
Colaco, J., Mittal, J.: An efficient approach to user navigation pattern prediction. In: IEEE International Conference on Advances in Electrical, Electronics, Information, Communication, and Bioinformatics, pp. 420–424 (2016)
Zhang, Q., Segall, R.: Web mining: a survey of current research, techniques, and software. Int. J. Inf. Technol. Decis. Making 7(4), 683–720 (2008)
El Haddad, G., Aïmeur, E., Hage, H.: Understanding trust, privacy and financial fears in online payment. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 28–36 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mostafa, A.M. (2019). Design and Implementation of Secured E-Business Structure with LTL Patterns for User Behavior Prediction. In: Alfaries, A., Mengash, H., Yasar, A., Shakshuki, E. (eds) Advances in Data Science, Cyber Security and IT Applications. ICC 2019. Communications in Computer and Information Science, vol 1098. Springer, Cham. https://doi.org/10.1007/978-3-030-36368-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-36368-0_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36367-3
Online ISBN: 978-3-030-36368-0
eBook Packages: Computer ScienceComputer Science (R0)