Secure Content Management In Ambient Environments - how about security and meta data?
暂无分享,去创建一个
[1] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[2] Menzo Windhouwer,et al. Flexible and scalable digital library search , 2001, VLDB.
[3] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[4] Shih-Fu Chang,et al. Overview of the MPEG-7 standard , 2001, IEEE Trans. Circuits Syst. Video Technol..
[5] Barry Smyth,et al. A personalized television listings service , 2000, CACM.
[6] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[7] Pieter H. Hartel,et al. Personal DJ, an architecture for personalised content delivery , 2001, WWW '01.
[8] DamianiErnesto,et al. A fine-grained access control system for XML documents , 2002 .
[9] Yee Wei Law,et al. LicenseScript : a language and framework for calculating licenses on information over constrained domains , 2002 .
[10] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[11] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[12] Willem Jonker,et al. Content-Based Retrieval of Spatio-Temporal Video Events , 2001 .
[13] Menzo Windhouwer,et al. Content-based video indexing for the support of digital library search , 2002, Proceedings 18th International Conference on Data Engineering.
[14] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[15] Milan Petkovic,et al. Multi-modal extraction of highlights from TV Formula 1 programs , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[16] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[17] Elisa Bertino,et al. Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.
[18] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[19] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.