A Fine-Grained Image Access Control Model
暂无分享,去创建一个
[1] Alban Gabillon,et al. Rule-based policy enforcement point for map services , 2010, SPRINGL '10.
[2] Frédéric Cuppens,et al. Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[3] Konstantinos N. Plataniotis,et al. A Novel Vector-Based Approach to Color Image Retrieval Using a Vector Angular-Based Distance Measure , 1999, Comput. Vis. Image Underst..
[4] Om Prakash Vyas,et al. A Novel Approach of Multilevel Positive and Negative Association Rule Mining for Spatial Databases , 2005, MLDM.
[5] Jianping Fan,et al. Access control, confidentiality and privacy for video surveillance databases , 2006, SACMAT '06.
[6] Richard Chbeir,et al. Content-Based Policy Specification for Multimedia Authorization and Access Control Model , 2007 .
[7] Christopher Edwards,et al. The effects of filtered video on awareness and privacy , 2000, CSCW '00.
[8] Ninghui Li,et al. Understanding SPKI/SDSI using first-order logic , 2005, International Journal of Information Security.
[9] Dekang Lin,et al. An Information-Theoretic Definition of Similarity , 1998, ICML.
[10] Richard Chbeir,et al. The image protector - A flexible security rule specification toolkit , 2011, Proceedings of the International Conference on Security and Cryptography.
[11] Tsung-Yi Chen,et al. Knowledge sharing in virtual enterprises via an ontology-based access control approach , 2008, Comput. Ind..
[12] Max J. Egenhofer,et al. Query Processing in Spatial-Query-by-Sketch , 1997, J. Vis. Lang. Comput..
[13] Bhavani Thuraisingham,et al. Security and privacy for multimedia database management systems , 2007, Multimedia Tools and Applications.
[14] Lixin Pan. A criterion-based multilayer access control model for multimedia applications in mpeg-7 , 2007 .
[15] Roy Rada,et al. Development and application of a metric on semantic nets , 1989, IEEE Trans. Syst. Man Cybern..
[16] James F. Allen. Maintaining knowledge about temporal intervals , 1983, CACM.
[17] Richard Chbeir,et al. MCA2CM: Multimedia Context-Aware Access Control Model , 2007, 2007 IEEE Intelligence and Security Informatics.
[18] V. S. Subrahmanian,et al. A multi-similarity algebra , 1998, SIGMOD '98.
[19] Elisa Bertino,et al. An access control model for video database systems , 2000, CIKM '00.
[20] Jianping Fan,et al. A hierarchical access control model for video database systems , 2003, TOIS.
[21] Richard Chbeir,et al. User Profile Matching in Social Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[22] Basit Shafiq,et al. A model for secure multimedia document database system in a distributed environment , 2002, IEEE Trans. Multim..
[23] Andrew U. Frank,et al. A Topological Data Model for Spatial Databases , 1990, SSD.
[24] Elisa Bertino,et al. A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..
[25] Essam A. El-Kwae,et al. A robust framework for content-based retrieval by spatial similarity in image databases , 1999, TOIS.
[26] Amirreza Masoumzadeh,et al. OSNAC: An Ontology-based Access Control Model for Social Networking Systems , 2010, 2010 IEEE Second International Conference on Social Computing.
[27] Richard Chbeir,et al. Novel Indexing Method of Relations Between Salient Objects , 2003, Effective Databases for Text & Document Management.
[28] H. Lan,et al. SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .
[29] Philip Resnik,et al. Using Information Content to Evaluate Semantic Similarity in a Taxonomy , 1995, IJCAI.
[30] Chang Nian Zhang,et al. A criterion-based multilayer access control approach for multimedia applications and the implementation considerations , 2008, TOMCCAP.
[31] Alban Gabillon,et al. Security mechanisms for geographic data , 2010, MEDES.
[32] Jianping Fan,et al. A novel approach for privacy-preserving video sharing , 2005, CIKM '05.
[33] Vijayalakshmi Atluri,et al. An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.
[34] Leon Pan. A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7 , 2007, Int. J. Netw. Secur..
[35] Max J. Egenhofer,et al. Determining Semantic Similarity among Entity Classes from Different Ontologies , 2003, IEEE Trans. Knowl. Data Eng..
[36] York Sure-Vetter,et al. Ontology Mapping - An Integrated Approach , 2004, ESWS.
[37] Alban Gabillon,et al. Enforcing Protection Mechanisms for Geographic Data , 2012, W2GIS.