Digital Rights Management and Access Control in Multimedia Social Networks
暂无分享,去创建一个
[1] Lifeng Sun,et al. Propagation-based social-aware replication for social video contents , 2012, ACM Multimedia.
[2] Farinaz Koushanfar,et al. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management , 2012, IEEE Transactions on Information Forensics and Security.
[3] Yuan Cheng,et al. A User-Activity-Centric Framework for Access Control in Online Social Networks , 2011, IEEE Internet Computing.
[4] David J. DeWitt,et al. Limiting Disclosure in Hippocratic Databases , 2004, VLDB.
[5] Christian Schaefer,et al. Usage Control Enforcement: Present and Future , 2008, IEEE Security & Privacy.
[6] Andrés Marín López,et al. Media cloud: an open cloud computing middleware for content management , 2011, IEEE Transactions on Consumer Electronics.
[7] Hefei Ling,et al. Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain , 2012, ACM Multimedia.
[8] Chong Luo,et al. Multimedia Cloud Computing , 2011, IEEE Signal Processing Magazine.
[9] María Bárbara Álvarez Torres,et al. On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops , 2004, Lecture Notes in Computer Science.
[10] Radu Sion,et al. A personal mobile DRM manager for smartphones , 2009, Comput. Secur..
[11] Barbara Carminati,et al. Rule-Based Access Control for Social Networks , 2006, OTM Workshops.
[12] Mingchu Li,et al. FineTrust: a fine-grained trust model for peer-to-peer networks , 2011, Secur. Commun. Networks.
[13] Mohan S. Kankanhalli,et al. An efficient access control method for multimedia social networks , 2010, WSM@MM.
[14] Zhiyong Zhang,et al. A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing , 2013 .
[15] Tian Li,et al. A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network , 2007 .
[16] Sebastian Ryszard Kruk,et al. D-FOAF: Distributed Identity Management with Access Rights Delegation , 2006, ASWC.
[17] Wilfred Villegas. A trust-based access control scheme for social networks , 2008 .
[18] Bin Song,et al. A TCM-Enabled Access Control Scheme , 2011, ICA3PP.
[19] Dan Ionescu,et al. A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking Environments , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[20] Fausto Giunchiglia,et al. The Semantic Web - ASWC 2006, First Asian Semantic Web Conference, Beijing, China, September 3-7, 2006, Proceedings , 2006, ASWC.
[21] MyoungBeom Chung,et al. Intelligent copyright protection system using a matching video retrieval algorithm , 2011, Multimedia Tools and Applications.
[22] Tony Thomas,et al. Secure interoperable digital content distribution mechanisms in a multi-domain architecture , 2011, Multimedia Tools and Applications.
[23] Jong Kim,et al. DRMFS: A file system layer for transparent access semantics of DRM-protected contents , 2012, J. Syst. Softw..
[24] Jong Kim,et al. Redistributing time-based rights between consumer devices for content sharing in DRM system , 2009, International Journal of Information Security.
[25] Zhi Tang,et al. An Efficient Contents Sharing Method for DRM , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[26] Bhavani M. Thuraisingham,et al. Semantic web-based social network access control , 2011, Comput. Secur..
[27] Kanliang Wang,et al. A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.
[28] Niu Xin-xin. Identity-based domain key distribution protocol in the E-document security management , 2012 .
[29] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[30] Zhiyong Zhang,et al. Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .
[31] Xi Chen,et al. Content distribution and copyright authentication based on combined indexing and watermarking , 2010, Multimedia Tools and Applications.
[32] Jorge Lobo,et al. Privacy-aware role based access control , 2009, SACMAT '07.
[33] Shiuh-Pyng Shieh,et al. A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks , 2012, IEEE Transactions on Vehicular Technology.
[34] Zhiyong Zhang. Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.
[35] Mohan S. Kankanhalli,et al. Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture , 2009, IEEE Transactions on Information Forensics and Security.
[36] Hua Wang,et al. Trust-Involved Access Control in Collaborative Open Social Networks , 2010, 2010 Fourth International Conference on Network and System Security.
[37] Muthucumaru Maheswaran,et al. A trust based approach for protecting user data in social networks , 2007, CASCON.
[38] Rob Johnson,et al. More Content - Less Control: Access Control in the Web 2.0 , 2006 .