نتایج جستجو برای: Inter-Transaction Dependency
تعداد نتایج: 182250 فیلتر نتایج به سال:
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
In e-commerce, different payment transactions have different levels of risk. Risk is generally higher for digital goods, but it also differs based on product and its popularity, the offer type (packaged game, virtual currency to a game or subscription service), storefront and geography. Existing fraud policies and models make decisions independently for each transaction based on transaction att...
Power plays a significant role in many organizational theories such as resource dependency theory and transaction cost economics. It allows the strong companies to win more than others, or more broadly, to coerce others to do what they would not otherwise do. Power can seriously affect the confidence and commitment between parties. This paper aims to analyze the power concept in inter-organizat...
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessm...
here we propose database intrusion detection system and it works on data mining technique. In recent era the state of art in the field of database intrusion detection mechanisms where the researchers worked on single attribute, multiple attribute or sensitivity of attribute to generate the data dependency. Our proposed approach work is also based on data dependency rule generation from database...
Inter-transaction pattern and rule mining has been the subject of active research and has potential application in many areas. All the previous inter-transaction rule mining studies proposed generating a full set of inter-transaction rules (i.e., all frequent and confident rules) from a full set of inter-transaction patterns (i.e., all frequent patterns). However, generating a full set inter-tr...
Collaboration platforms are inter-organizational application systems for supporting or enabling inter-firm co-operation and collaboration. Although a number of collaboration platforms emerged from electronic marketplaces their underlying business logic differs significantly. Electronic marketplaces focus on negotiated pricing whereas collaboration platforms support or facilitate inter-firm coll...
The growth of business-to-business e-commerce has highlighted the role of computer and communications technologies as well as inter-organizational trust in developing and maintaining business-to-business relationships. Despite the acknowledged importance of trust, only a limited amount of research exists and that examines the role of trust in these relationships. By investigating inter-organiza...
Previous research in the area of mobile transactions has mainly concentrated in developing schemes for processing conventional transactions, location management, and data broadcast. No one has examined how such mobility issues as location dependent data impact the actual deenition of a transaction in the mobile computing environment. There is a distinct lack of work related to data classiicatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید