Access control, confidentiality and privacy for video surveillance databases
暂无分享,去创建一个
[1] Bhavani M. Thuraisingham,et al. A framework for a video analysis tool for suspicious event detection , 2005, MDM '05.
[2] Jianping Fan,et al. A hierarchical access control model for video database systems , 2003, TOIS.
[3] Takeo Kanade,et al. Algorithms for cooperative multisensor surveillance , 2001, Proc. IEEE.
[4] Boaz Gelbord,et al. New surveillance techniques raise privacy concerns , 2002, CACM.
[5] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[6] Jianping Fan,et al. Salient Objects: Semantic Building Blocks for Image Concept Interpretation , 2004, CIVR.
[7] R. Armitage. To CCTV or not to CCTV?: A review of current research into the effectiveness of CCTV systems in reducing crime , 2002 .
[8] Koichi Sakurai,et al. Security of Multimedia Systems , 2002 .
[9] Vijayalakshmi Atluri,et al. An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.
[10] Jianping Fan,et al. Automatic image segmentation by integrating color-edge extraction and seeded region growing , 2001, IEEE Trans. Image Process..
[11] Elisa Bertino,et al. A Logical Approach to Quality of Service Specification in Video Databases , 2004, Multimedia Tools and Applications.
[12] Sharath Pankanti,et al. Enabling video privacy through computer vision , 2005, IEEE Security & Privacy Magazine.
[13] Jianping Fan,et al. A novel approach for privacy-preserving video sharing , 2005, CIKM '05.
[14] Sharath Pankanti,et al. Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .
[15] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.