Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Managing Virtual Web Organizations in the 21st Century: Issues and Challenges
Managing Virtual Web Organizations in the 21st Century: Issues and Challenges
Virtual organization and electronic commerce
ACM SIGMIS Database
Modeling centralized organization of organizational change
Computational & Mathematical Organization Theory
Formally comparing user and implementer model-based testing methods
ICSTW '08 Proceedings of the 2008 IEEE International Conference on Software Testing Verification and Validation Workshop
Interoperability of Context Based System Policies Using O2O Contract
SITIS '08 Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
A policy-based authorization model for workflow-enabled dynamic process management
Journal of Network and Computer Applications
Formal methods: Practice and experience
ACM Computing Surveys (CSUR)
The model role level: a vision
ER'10 Proceedings of the 29th international conference on Conceptual modeling
Secure collaborative cloud design for global USN services
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
A semantic web approach to heterogeneous metadata integration
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
An improved ant algorithm for fuzzy data mining
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
Planning in collaborative stigmergic workspaces
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part II
Formal enforcement and management of obligation policies
Data & Knowledge Engineering
Hi-index | 0.00 |
There are several methods to assess the capability of a organization to prevent attacks in a potentially wrong collaborative scenario. In this paper we explore a methodology based on considering some probabilistic information. We assume that we are provided with a probabilistic user model. This is a model denoting the probability that the entity interacting with the system takes each available choice. We show how to build these models using the log files. Moreover, we define the meaning of a good, a bad and a suspicious behavior. Finally, we present a mechanism to share the information presented in each node of the collaborative system.