Filters








163,627 Hits in 2.6 sec

ACConv -- An Access Control Model for Conversational Web Services

Federica Paci, Massimo Mecella, Mourad Ouzzani, Elisa Bertino
2011 ACM Transactions on the Web  
We propose ACCONV, a novel model for access control in Web services that is suitable when interactions between the client and the Web service are conversational and long-running.  ...  Clients are requested to provide credentials, and hence are entrusted with part of the Web service access control policies, only for some specific granted conversations which are decided based on: (1)  ...  ACKNOWLEDGMENTS The authors would like to thank Simone Savi and Alfonso Calciano for their contributions to the implementation of the software prototype.  ... 
doi:10.1145/1993053.1993055 fatcat:yqavh5j56vghbh3hym7pgllkyu

Selective Markov models for predicting Web page accesses

Mukund Deshpande, George Karypis
2004 ACM Transactions on Internet Technology  
Markov models and their variations have been found well suited for addressing this problem.  ...  In this paper we present different techniques for intelligently selecting parts of different order Markov models so that the resulting model has a reduced state complexity and improved prediction accuracy  ...  in which the memory constraints are tight (e.g. embedded models for web-access caching [PM96] ).  ... 
doi:10.1145/990301.990304 fatcat:ikn27auq7fhhzbinysor35sevu

Extended Request-oriented Role Access Control Model for Web Applications

Dmitry KONONOV, Sergey ISAEV
2018 DEStech Transactions on Computer Science and Engineering  
This work is dedicated to developing security access control model for web applications. Our work is focused on RBAC model described by Ferraiolo and Kuhn [1992] and Sandhu [1998] .  ...  Applying this new model allows reducing security risks for web applications.  ...  Roles are intended to manage access control rules in a more simple way. Modern web applications and web services use role-based access control models because of flexibility [9, 10] .  ... 
doi:10.12783/dtcse/cmee2017/19958 fatcat:vx5eexsblnhnbmeomtx6mb2vgy

JPernLite

Jack J. Yang, Gail E. Kaiser
1998 Proceedings of the ninth ACM conference on Hypertext and hypermedia : links, objects, time and space---structure in hypermedia systems links, objects, time and space---structure in hypermedia systems - HYPERTEXT '98  
But this conventional model may not be appropriate for collaborative hypermedia systems, where the multiple users work together in groups on shared tasks.  ...  The transaction server by default enforces the conventional transaction model, where sets of operations are performed in an all-or-nothing fashion and isolated from concurrent users.  ...  ACKNOWLEDGMENTS Many thanks to Steve Dossick, Ken Anderson, Jim Whitehead and Uffe Kock Wiil for their thoughtful discussions and recommendations for related information.  ... 
doi:10.1145/276627.276655 dblp:conf/ht/YangK98 fatcat:lfccfl3vj5dbjfu4j6gs2djncq

Dynamic Modeling by Usage Data for Personalization Systems

Saeed Reza Aghabozorgi, Teh Yang Wah
2009 2009 13th International Conference Information Visualisation  
Finally, we discuss the on-line model for user behaviour prediction in the web personalization system. 450 IEEE computer society  ...  T-hen, we will use users' transactions periodically to change the off-line model to a dynamic-model.  ...  A transaction is a set of entries in web access log accessed by a user from the same machine in defined time windows and in a single session [sal 0].  ... 
doi:10.1109/iv.2009.111 dblp:conf/iv/AghabozorgiW09 fatcat:mgsu6m7qufcqvkry7tasvixrze

An Access Control Model for Web Databases [chapter]

Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi
2010 Lecture Notes in Computer Science  
The majority of today's web-based applications are based on back-end databases to process and store business information.  ...  Hence, attacks caused by malicious transactions can be detected and canceled timely before they succeed.  ...  In this paper we have presented RBAC + , an extension of the RBAC model addressing access control requirements for RBAC-administered web databases.  ... 
doi:10.1007/978-3-642-13739-6_19 fatcat:xslhtij7pfh2lozp5kghrfwdcq

Cut-and-Pick Transactions for Proxy Log Mining [chapter]

Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
2002 Lecture Notes in Computer Science  
We present a more advanced cut-and-pick method for determining the access transactions from proxy logs, by deciding on more reasonable transaction boundaries and by removing noisy accesses.  ...  By using real-world proxy logs, we experimentally show that this cut-and-pick method can produce more accurate transactions that result in Web-access prediction models with higher accuracy.  ...  lead to better Web-access prediction models with higher accuracy.  ... 
doi:10.1007/3-540-45876-x_8 fatcat:rhnqj4syrjbxrjv2gohjcrqj7u

RBAC+: Protecting Web Databases With Access Control Mechanism

Archna Arudkar, Vimla Jethani
2012 INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY  
Hence, current approaches to access control on databases do not fit for web databases because they are mostly based on individual user identities.  ...  In this paper, RBAC+ Model, an extension of NIST RBAC provides a application aware access control system to prevent attacks with the notion of application, application profile and sub-application session  ...  (insert, delete, update) CONCLUSION RBAC + , an extension of RBAC model, suggests access control mechanisms for RBAC implemented web databases.  ... 
doi:10.24297/ijmit.v2i1.1407 fatcat:asizaxy34jcbjhqlud2fwu2n4e

On the Use of Constrained Associations for Web Log Mining [chapter]

Hui Yang, Srinivasan Parthasarathy
2003 Lecture Notes in Computer Science  
In recent years there has been an increasing interest and a growing body of work in web usage mining as an underlying approach to capture and model the behavior of users on the web for business intelligence  ...  Detailed experimental evaluation shows how the approach is quite effective in capturing a web user's access patterns; consequently, our prediction model not only has good prediction accuracy, but also  ...  of web-page accesses ( be represented as a set of web transactions.  ... 
doi:10.1007/978-3-540-39663-5_7 fatcat:ekxmmmwvkzaobpf7e6k5k2hwge

A Framework for Distributed Information Management in the Virtual Enterprise: The Vega Project [chapter]

Alain Zarli, Patrice Poyet
1999 IFIP Advances in Information and Communication Technology  
Acknowledgments The authors thank all the partners for their collaboration within VEGA,  ...  Thus, the combination of (CORBA) middleware and WEB technologies has a potential for offering extended and generic solutions for a future dominant computing model for enterprises, promoting a new generation  ...  The VEGA platfonn is actually managing four different technologies: • product-data modeling for the specification of useful project infonnation models; • middleware technology for the distribution of project  ... 
doi:10.1007/978-0-387-35577-1_19 fatcat:jh3oryclsjdqhd2mra5cepdvju

Access control and management in B2C model of electronic commerce

Irina Noninska
2003 Proceedings of the 4th international conference conference on Computer systems and technologies e-Learning - CompSysTech '03  
It is a part of the Business Mnangement System in B2C model and could be implemented for customizing, analysis of Web sites, planning and development of data security according to the new tendencies in  ...  As a result a hierarchical structure with four levels is proposed, which is intended to realize access control of the users and transactions management.  ...  An approach for access control of the users is proposed which could be implemented for transactions management in B2C model and helps analysis of of B2C Web sites.  ... 
doi:10.1145/973620.973685 fatcat:ryfew27a4nefjl7t6iczn6p4d4

From Machine Learning to Data Mining [chapter]

1999 Computational Intelligence for Decision Support  
-Developed web mining and machine learning based solutions such as contextual browsing, model-directed web transactions, automated construction of web accessibility models to improve web accessibility.  ...  -Conducted research on improving web accessibility.  ...  Ramakrishnan, "Model-directed Web Transactions under Constrained Modalities", ACM Transactions on the Web (TWEB), Volume 1, Issue 3 (September 2007).  ... 
doi:10.1201/9781420049145.pt3 fatcat:5jqgb2ymybho7grxji44xgljje

A New Web Usage Mining Approach for Next Page Access Prediction

A. Anitha
2010 International Journal of Computer Applications  
In this paper, a new web usage mining approach is proposed to predict next page access.  ...  Mining the web access log of users of similar interest provides good recommendation accuracy. Hence, the proposed model provides accurate recommendations with reduced state space complexity.  ...  The web usage mining approaches can be applied to predict next page access [3] . The web recommendation models provide access friendliness for users while browsing a website.  ... 
doi:10.5120/1252-1700 fatcat:sr4spg3i3beqdilaeuucknwgfm

Flexible transaction processing in the Argos middleware

Anna-Brith Arntsen, Mats Mortensen, Randi Karlsen, Anders Andersen, Arne Munch-Ellingsen
2008 Proceedings of the 2008 EDBT workshop on Software engineering for tailor-made data management - SETMDM '08  
This is to some extend demonstrated within Web service environments where support for both ACID and long-running business transactions are provided.  ...  We believe that transactional middleware platforms must be flexible in order to adapt to varying transactional requirements.  ...  This standard middleware functionality simplifies the programming model for applications. To implement this feature, Argos had to implement abstractions for accessing transactional resources.  ... 
doi:10.1145/1385486.1385491 fatcat:oqzltbx6kvhunii267lobtnxom

Versioned transactional shared memory for the FénixEDU web application

Nuno Carvalho, João Cachopo, Luís Rodrigues, António Rito Silva
2008 Proceedings of the 2nd workshop on Dependable distributed data management - SDDDM '08  
The FénixEDU system uses a novel infrastructure for web applications based on the Versioned Software Transactional Memory (VSTM) abstraction.  ...  For that purpose we are developing a distributed version of the VSTM, such that multiple application servers can concurrently serve different request and still coordinate in an efficient manner to provide  ...  Over time, the system became a very large web application with a rich domain model.  ... 
doi:10.1145/1435523.1435526 fatcat:a4jpodinbvfkzkayg4k5gbuaei
« Previous Showing results 1 — 15 out of 163,627 results