Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
New machine learning model based on the time factor for e-commerce recommendation systems
Nowadays, thanks to the development of e-commerce websites, businesses can capitalize
on many benefits, for example, there are many methods of approaching customers online …
on many benefits, for example, there are many methods of approaching customers online …
Distributed and typed role-based access control mechanisms driven by CRUD expressions
Business logics of relational databases applications are an important source of security
violations, namely in respect to access control. The situation is particularly critical when …
violations, namely in respect to access control. The situation is particularly critical when …
Role-based access control mechanisms
Most of the security threats in relational database applications have their source in client-
side systems when they issue requests formalized by Create, Read, Update and Delete …
side systems when they issue requests formalized by Create, Read, Update and Delete …
Reusable business tier components: based on CLI and driven by a single wide typed service
Abstract Call Level Interfaces (CLI) are software API used for building business tiers of
relational database applications whenever performance is a key requirement. Nevertheless …
relational database applications whenever performance is a key requirement. Nevertheless …
[PDF][PDF] ABTC: Multi-purpose Adaptable Business Tier Components Based on Call Level Interfaces
Abstract Call Level Interfaces (CLI) are low level API that play a key role in database
applications whenever a fine tune control between application tiers and the host databases …
applications whenever a fine tune control between application tiers and the host databases …
Dynamic and Secure Remote Database Access With Soft Access Policies Integration
DJD Regateiro - 2021 - search.proquest.com
A quantidade de dados criados e partilhados tem crescido nos últimos anos, em parte
graças às redes sociais e à proliferação dos dispositivos inteligentes. A gestão do …
graças às redes sociais e à proliferação dos dispositivos inteligentes. A gestão do …
DACA: Architecture to Implement Dynamic Access Control Mechanisms on Business Tier Components
ÓNM Pereira - 2013 - search.proquest.com
Access control is a software engineering challenge in database applications. Currently,
there is no satisfactory solution to dynamically implement evolving fine-grained access …
there is no satisfactory solution to dynamically implement evolving fine-grained access …
[PDF][PDF] Protecting Databases from Schema Disclosure
ACP Model - 2016 - academia.edu
Database schemas, in many organizations, are considered one of the critical assets to be
protected. From database schemas, it is not only possible to infer the information being …
protected. From database schemas, it is not only possible to infer the information being …
[PDF][PDF] Extending RBAC Model
In database applications, access control is aimed at supervising users' requests to access
sensitive data. Users' requests are mainly formalized by Create, Read, Update and Delete …
sensitive data. Users' requests are mainly formalized by Create, Read, Update and Delete …
[PDF][PDF] Óscar Narciso
M Pereira - academia.edu
Fine-grained access control (FGAC) is a critical security issue in many software systems,
mainly when policies evolve over time. Software systems are increasingly involved in all …
mainly when policies evolve over time. Software systems are increasingly involved in all …