New machine learning model based on the time factor for e-commerce recommendation systems

DT Tran, JH Huh - The Journal of Supercomputing, 2023 - Springer
Nowadays, thanks to the development of e-commerce websites, businesses can capitalize
on many benefits, for example, there are many methods of approaching customers online …

Distributed and typed role-based access control mechanisms driven by CRUD expressions

OM Pereira, DD Regateiro, RL Aguiar - International Journal of …, 2014 - hal.science
Business logics of relational databases applications are an important source of security
violations, namely in respect to access control. The situation is particularly critical when …

Role-based access control mechanisms

ÓM Pereira, DD Regateiro… - 2014 IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Most of the security threats in relational database applications have their source in client-
side systems when they issue requests formalized by Create, Read, Update and Delete …

Reusable business tier components: based on CLI and driven by a single wide typed service

ÓM Pereira, RL Aguiar, MY Santos - International Journal of …, 2014 - igi-global.com
Abstract Call Level Interfaces (CLI) are software API used for building business tiers of
relational database applications whenever performance is a key requirement. Nevertheless …

[PDF][PDF] ABTC: Multi-purpose Adaptable Business Tier Components Based on Call Level Interfaces

ÓM Pereira, RL Aguiar, MY Santos - … -Journal of Research and Practice in … - academia.edu
Abstract Call Level Interfaces (CLI) are low level API that play a key role in database
applications whenever a fine tune control between application tiers and the host databases …

Dynamic and Secure Remote Database Access With Soft Access Policies Integration

DJD Regateiro - 2021 - search.proquest.com
A quantidade de dados criados e partilhados tem crescido nos últimos anos, em parte
graças às redes sociais e à proliferação dos dispositivos inteligentes. A gestão do …

DACA: Architecture to Implement Dynamic Access Control Mechanisms on Business Tier Components

ÓNM Pereira - 2013 - search.proquest.com
Access control is a software engineering challenge in database applications. Currently,
there is no satisfactory solution to dynamically implement evolving fine-grained access …

[PDF][PDF] Protecting Databases from Schema Disclosure

ACP Model - 2016 - academia.edu
Database schemas, in many organizations, are considered one of the critical assets to be
protected. From database schemas, it is not only possible to infer the information being …

[PDF][PDF] Extending RBAC Model

In database applications, access control is aimed at supervising users' requests to access
sensitive data. Users' requests are mainly formalized by Create, Read, Update and Delete …

[PDF][PDF] Óscar Narciso

M Pereira - academia.edu
Fine-grained access control (FGAC) is a critical security issue in many software systems,
mainly when policies evolve over time. Software systems are increasingly involved in all …