A global strategy for controlling document distribution in confidential document management system
暂无分享,去创建一个
[1] Shing-Chi Cheung,et al. The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..
[2] Zunera Jalil,et al. A Review of Digital Watermarking Techniques for Text Documents , 2009, 2009 International Conference on Information and Multimedia Technology.
[3] Jun Liu,et al. An USB-Key_based approach for software tamper resistance , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[4] Tao Li,et al. File View: Secure Model in Intranet , 2009, 2009 International Conference on Networking and Digital Society.
[5] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[6] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[7] Yong Ai,et al. A Framework for a File View Model in Intranets , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[8] Jun Liu,et al. A Secure Confidential Document Model and Its Application , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[9] Shing-Chi Cheung,et al. A watermarking infrastructure for enterprise document management , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[10] Chen Chao,et al. Application of Digital Watermarking Using Plugins to Prevent Leaking of E-Documents from Internal Networks , 2008 .
[11] Ravi S. Sandhu,et al. How to do discretionary access control using roles , 1998, RBAC '98.