A multimedia access control language for virtual and ambient intelligence environments
暂无分享,去创建一个
[1] Charles A. Shoniregun,et al. Securing XML Documents , 2004, Australas. J. Inf. Syst..
[2] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[3] Surya Nepal,et al. Query processing issues in image (multimedia) databases , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[4] Divyakant Agrawal,et al. Approximate nearest neighbor searching in multimedia databases , 2001, Proceedings 17th International Conference on Data Engineering.
[5] Richard Chbeir,et al. Towards Fully Functional Distributed MultiMedia DBMS , 2004, J. Digit. Inf. Manag..
[6] Sabrina De Capitani di Vimercati,et al. Access Control of SVG Documents , 2002, DBSec.
[7] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[8] Elisa Bertino,et al. Access-control language for multidomain environments , 2004, IEEE Internet Computing.
[9] Richard Chbeir,et al. MCA2CM: Multimedia Context-Aware Access Control Model , 2007, 2007 IEEE Intelligence and Security Informatics.
[10] J. Miteran,et al. Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine , 2006, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics.
[11] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[12] Arthur P. Dempster,et al. A Generalization of Bayesian Inference , 1968, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[13] David Poole,et al. Logic, Knowledge Representation, and Bayesian Decision Theory , 2000, Computational Logic.
[14] Elisa Bertino,et al. A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..
[15] Sylvia L. Osborn,et al. A role-based approach to access control for XML databases , 2004, SACMAT '04.
[16] Ernesto Damiani,et al. Towards Privacy-Enhanced Authorization Policies and Languages , 2005, DBSec.
[17] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.