A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
ACConv -- An Access Control Model for Conversational Web Services
2011
ACM Transactions on the Web
We propose ACCONV, a novel model for access control in Web services that is suitable when interactions between the client and the Web service are conversational and long-running. ...
Clients are requested to provide credentials, and hence are entrusted with part of the Web service access control policies, only for some specific granted conversations which are decided based on: (1) ...
ACKNOWLEDGMENTS The authors would like to thank Simone Savi and Alfonso Calciano for their contributions to the implementation of the software prototype. ...
doi:10.1145/1993053.1993055
fatcat:yqavh5j56vghbh3hym7pgllkyu
Selective Markov models for predicting Web page accesses
2004
ACM Transactions on Internet Technology
Markov models and their variations have been found well suited for addressing this problem. ...
In this paper we present different techniques for intelligently selecting parts of different order Markov models so that the resulting model has a reduced state complexity and improved prediction accuracy ...
in which the memory constraints are tight (e.g. embedded models for web-access caching [PM96] ). ...
doi:10.1145/990301.990304
fatcat:ikn27auq7fhhzbinysor35sevu
Extended Request-oriented Role Access Control Model for Web Applications
2018
DEStech Transactions on Computer Science and Engineering
This work is dedicated to developing security access control model for web applications. Our work is focused on RBAC model described by Ferraiolo and Kuhn [1992] and Sandhu [1998] . ...
Applying this new model allows reducing security risks for web applications. ...
Roles are intended to manage access control rules in a more simple way. Modern web applications and web services use role-based access control models because of flexibility [9, 10] . ...
doi:10.12783/dtcse/cmee2017/19958
fatcat:vx5eexsblnhnbmeomtx6mb2vgy
But this conventional model may not be appropriate for collaborative hypermedia systems, where the multiple users work together in groups on shared tasks. ...
The transaction server by default enforces the conventional transaction model, where sets of operations are performed in an all-or-nothing fashion and isolated from concurrent users. ...
ACKNOWLEDGMENTS Many thanks to Steve Dossick, Ken Anderson, Jim Whitehead and Uffe Kock Wiil for their thoughtful discussions and recommendations for related information. ...
doi:10.1145/276627.276655
dblp:conf/ht/YangK98
fatcat:lfccfl3vj5dbjfu4j6gs2djncq
Dynamic Modeling by Usage Data for Personalization Systems
2009
2009 13th International Conference Information Visualisation
Finally, we discuss the on-line model for user behaviour prediction in the web personalization system. 450 IEEE computer society ...
T-hen, we will use users' transactions periodically to change the off-line model to a dynamic-model. ...
A transaction is a set of entries in web access log accessed by a user from the same machine in defined time windows and in a single session [sal 0]. ...
doi:10.1109/iv.2009.111
dblp:conf/iv/AghabozorgiW09
fatcat:mgsu6m7qufcqvkry7tasvixrze
An Access Control Model for Web Databases
[chapter]
2010
Lecture Notes in Computer Science
The majority of today's web-based applications are based on back-end databases to process and store business information. ...
Hence, attacks caused by malicious transactions can be detected and canceled timely before they succeed. ...
In this paper we have presented RBAC + , an extension of the RBAC model addressing access control requirements for RBAC-administered web databases. ...
doi:10.1007/978-3-642-13739-6_19
fatcat:xslhtij7pfh2lozp5kghrfwdcq
Cut-and-Pick Transactions for Proxy Log Mining
[chapter]
2002
Lecture Notes in Computer Science
We present a more advanced cut-and-pick method for determining the access transactions from proxy logs, by deciding on more reasonable transaction boundaries and by removing noisy accesses. ...
By using real-world proxy logs, we experimentally show that this cut-and-pick method can produce more accurate transactions that result in Web-access prediction models with higher accuracy. ...
lead to better Web-access prediction models with higher accuracy. ...
doi:10.1007/3-540-45876-x_8
fatcat:rhnqj4syrjbxrjv2gohjcrqj7u
RBAC+: Protecting Web Databases With Access Control Mechanism
2012
INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY
Hence, current approaches to access control on databases do not fit for web databases because they are mostly based on individual user identities. ...
In this paper, RBAC+ Model, an extension of NIST RBAC provides a application aware access control system to prevent attacks with the notion of application, application profile and sub-application session ...
(insert, delete, update)
CONCLUSION RBAC + , an extension of RBAC model, suggests access control mechanisms for RBAC implemented web databases. ...
doi:10.24297/ijmit.v2i1.1407
fatcat:asizaxy34jcbjhqlud2fwu2n4e
On the Use of Constrained Associations for Web Log Mining
[chapter]
2003
Lecture Notes in Computer Science
In recent years there has been an increasing interest and a growing body of work in web usage mining as an underlying approach to capture and model the behavior of users on the web for business intelligence ...
Detailed experimental evaluation shows how the approach is quite effective in capturing a web user's access patterns; consequently, our prediction model not only has good prediction accuracy, but also ...
of web-page accesses ( be represented as a set of web transactions. ...
doi:10.1007/978-3-540-39663-5_7
fatcat:ekxmmmwvkzaobpf7e6k5k2hwge
A Framework for Distributed Information Management in the Virtual Enterprise: The Vega Project
[chapter]
1999
IFIP Advances in Information and Communication Technology
Acknowledgments The authors thank all the partners for their collaboration within VEGA, ...
Thus, the combination of (CORBA) middleware and WEB technologies has a potential for offering extended and generic solutions for a future dominant computing model for enterprises, promoting a new generation ...
The VEGA platfonn is actually managing four different technologies: • product-data modeling for the specification of useful project infonnation models; • middleware technology for the distribution of project ...
doi:10.1007/978-0-387-35577-1_19
fatcat:jh3oryclsjdqhd2mra5cepdvju
Access control and management in B2C model of electronic commerce
2003
Proceedings of the 4th international conference conference on Computer systems and technologies e-Learning - CompSysTech '03
It is a part of the Business Mnangement System in B2C model and could be implemented for customizing, analysis of Web sites, planning and development of data security according to the new tendencies in ...
As a result a hierarchical structure with four levels is proposed, which is intended to realize access control of the users and transactions management. ...
An approach for access control of the users is proposed which could be implemented for transactions management in B2C model and helps analysis of of B2C Web sites. ...
doi:10.1145/973620.973685
fatcat:ryfew27a4nefjl7t6iczn6p4d4
From Machine Learning to Data Mining
[chapter]
1999
Computational Intelligence for Decision Support
-Developed web mining and machine learning based solutions such as contextual browsing, model-directed web transactions, automated construction of web accessibility models to improve web accessibility. ...
-Conducted research on improving web accessibility. ...
Ramakrishnan, "Model-directed Web Transactions under Constrained Modalities", ACM Transactions on the Web (TWEB), Volume 1, Issue 3 (September 2007). ...
doi:10.1201/9781420049145.pt3
fatcat:5jqgb2ymybho7grxji44xgljje
A New Web Usage Mining Approach for Next Page Access Prediction
2010
International Journal of Computer Applications
In this paper, a new web usage mining approach is proposed to predict next page access. ...
Mining the web access log of users of similar interest provides good recommendation accuracy. Hence, the proposed model provides accurate recommendations with reduced state space complexity. ...
The web usage mining approaches can be applied to predict next page access [3] . The web recommendation models provide access friendliness for users while browsing a website. ...
doi:10.5120/1252-1700
fatcat:sr4spg3i3beqdilaeuucknwgfm
Flexible transaction processing in the Argos middleware
2008
Proceedings of the 2008 EDBT workshop on Software engineering for tailor-made data management - SETMDM '08
This is to some extend demonstrated within Web service environments where support for both ACID and long-running business transactions are provided. ...
We believe that transactional middleware platforms must be flexible in order to adapt to varying transactional requirements. ...
This standard middleware functionality simplifies the programming model for applications. To implement this feature, Argos had to implement abstractions for accessing transactional resources. ...
doi:10.1145/1385486.1385491
fatcat:oqzltbx6kvhunii267lobtnxom
Versioned transactional shared memory for the FénixEDU web application
2008
Proceedings of the 2nd workshop on Dependable distributed data management - SDDDM '08
The FénixEDU system uses a novel infrastructure for web applications based on the Versioned Software Transactional Memory (VSTM) abstraction. ...
For that purpose we are developing a distributed version of the VSTM, such that multiple application servers can concurrently serve different request and still coordinate in an efficient manner to provide ...
Over time, the system became a very large web application with a rich domain model. ...
doi:10.1145/1435523.1435526
fatcat:a4jpodinbvfkzkayg4k5gbuaei
« Previous
Showing results 1 — 15 out of 163,627 results