Sciweavers

357 search results - page 35 / 72
» A transaction manager component for cooperative transaction ...
Sort
View
CIKM
2008
Springer
15 years 3 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
DEXA
1994
Springer
137views Database» more  DEXA 1994»
15 years 6 months ago
RTSORAC: A Real-Time Object-Oriented Database Model
A real-time database is a database in which both the data and the operations upon the data may have timing constraints. We have integrated real-time, object-oriented, semantic and ...
Janet J. Prichard, Lisa Cingiser DiPippo, Joan Pec...
ISR
2006
15 years 1 months ago
How Often Should Reputation Mechanisms Update a Trader's Reputation Profile?
Reputation mechanisms have become an important component of electronic markets, helping to build trust and elicit cooperation among loosely connected and geographically dispersed ...
Chrysanthos Dellarocas
SAC
2004
ACM
15 years 7 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
DBSEC
2009
130views Database» more  DBSEC 2009»
15 years 3 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...