Sciweavers

4445 search results - page 50 / 889
» Reflective Authorization Systems
Sort
View
HICSS
2010
IEEE
227views Biometrics» more  HICSS 2010»
14 years 4 months ago
Do Online Reviews Reflect a Product's True Perceived Quality? - An Investigation of Online Movie Reviews Across Cultures
When does the reported average of online ratings match perceived average assessment? We apply behavioral theory to capture intentions in rating online movie reviews in two dissimi...
Noi Sian Koh, Nan Hu, Eric K. Clemons
SCCC
1999
IEEE
14 years 2 months ago
MetaFT-A Reflective Approach to Implement Replication Techniques in CORBA
A model was introduced in [Fraga97] for integrating replication techniques in heterogeneous systems. The model adopts a reflective structure based on the meta-object approach [10]...
Lau Cheuk Lung, Joni da Silva Fraga, Carlos Mazier...
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 11 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
JIFS
2006
120views more  JIFS 2006»
13 years 10 months ago
Building similarity metrics reflecting utility in case-based reasoning
Fundamental to case-based reasoning is the idea that similar problems have similar solutions. The meaning of the concept of "similarity" can vary in different situations...
Ning Xiong, Peter Funk
SACMAT
2009
ACM
14 years 4 months ago
Patient-centric authorization framework for sharing electronic health records
Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Co...