메뉴 건너뛰기




Volumn , Issue , 2007, Pages 115-123

MCA2CM: Multimedia Context-Aware Access Control Model

Author keywords

Authorization and access control; Conditions; Context; Multimedia objects; Multimedia predicate; Policies

Indexed keywords

ACCESS CONTROL; INFORMATION RETRIEVAL; INFORMATION SYSTEMS; MATHEMATICAL MODELS; TEXT PROCESSING;

EID: 34748907891     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (29)
  • 2
    • 0001655091 scopus 로고    scopus 로고
    • A generalization of the Bayesian inference. Journal of Royal Statistical, 1968
    • A. P. Dempster. "A generalization of the Bayesian inference". Journal of Royal Statistical, 1968, Society 30: pp. 205-447.
    • Society , vol.30 , pp. 205-447
    • Dempster, A.P.1
  • 3
    • 34748816473 scopus 로고    scopus 로고
    • ASP Alliance, http://aspalliance.com/404_Image_Web_Service, (22/10/2006)
    • ASP Alliance, http://aspalliance.com/404_Image_Web_Service, (22/10/2006)
  • 4
    • 33845427407 scopus 로고    scopus 로고
    • A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments
    • A. Toninelli, R. Montanari, L. Kagal, O. Lassila: "A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments". International Semantic Web Conference 2006: pp. 473-486
    • International Semantic Web Conference 2006 , pp. 473-486
    • Toninelli, A.1    Montanari, R.2    Kagal, L.3    Lassila, O.4
  • 6
    • 0019608720 scopus 로고
    • Formal models of computer security
    • Sept
    • C. E. Landwehr, "Formal models of computer security," ACM Comput. Surv., 13(3), Sept. 1981: pp. 247-278.
    • (1981) ACM Comput. Surv , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 7
    • 2942558770 scopus 로고    scopus 로고
    • Towards Context-aware Security: An Authorization Architecture for Intranet Environments
    • C. Wullems, M. Looi, A. Clark: "Towards Context-aware Security: An Authorization Architecture for Intranet Environments". PerCom Workshops 2004: pp. 132-137
    • (2004) PerCom Workshops , pp. 132-137
    • Wullems, C.1    Looi, M.2    Clark, A.3
  • 8
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • February
    • D. F. Ferraiolo, J. F. Barkley, D. R. Kuhn, "A role-based access control model and reference implementation within a corporate intranet", ACM Transactions on Information and System Security, February 1999, 2(1): pp. 34-64.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 9
    • 63649149206 scopus 로고    scopus 로고
    • D. Poole. Logic, knowledge representation, and Bayesian decision theory. In Proceedings CL-2000, 2000 pp. 70-86
    • D. Poole. Logic, knowledge representation, and Bayesian decision theory. In Proceedings CL-2000, 2000 pp. 70-86
  • 10
    • 34748817090 scopus 로고    scopus 로고
    • Efg2 Computer labs, http://www.efg2.com/Lab/Library/ImageProcessing/ SoftwarePackages.htm (05/10/2006)
    • Efg2 Computer labs, http://www.efg2.com/Lab/Library/ImageProcessing/ SoftwarePackages.htm (05/10/2006)
  • 12
    • 34748881498 scopus 로고    scopus 로고
    • Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine
    • France
    • F. Smach, C. Lemaitre, J. Miteran, J. Gauthier, M. Atri, "Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine", Proceedings of IECON'06, IEEE, Parts-CNAM, France, 2006, pp. 3238-3242
    • (2006) Proceedings of IECON'06, IEEE, Parts-CNAM , pp. 3238-3242
    • Smach, F.1    Lemaitre, C.2    Miteran, J.3    Gauthier, J.4    Atri, M.5
  • 15
    • 34748830609 scopus 로고    scopus 로고
    • TEC, http://www.chiariglione.org/mpeg/standards/mpeg-7/mpeg-7.htm,
    • ISO/ 27/10
    • ISO/TEC, http://www.chiariglione.org/mpeg/standards/mpeg-7/mpeg-7.htm, (27/10/2006)
    • (2006)
  • 16
    • 34748889200 scopus 로고    scopus 로고
    • J. Hu, A. C. Weaver, Dynamic Context-Aware Access Control for Distributed Healthcare Applications. In proceedings of First Workshop on Pervasive Security, Privacy and Trust (PSPT), Boston MA, 2004.
    • J. Hu, A. C. Weaver, "Dynamic Context-Aware Access Control for Distributed Healthcare Applications". In proceedings of First Workshop on Pervasive Security, Privacy and Trust (PSPT), Boston MA, 2004.
  • 17
    • 34748815207 scopus 로고    scopus 로고
    • Java Community Press, http://jcp.org/en/jsr/detail?id=135, (12/11/2006)
    • Java Community Press, http://jcp.org/en/jsr/detail?id=135, (12/11/2006)
  • 18
    • 33646759918 scopus 로고    scopus 로고
    • RDF-Based Model for Context-Aware Reasoning in Rich Service Environment
    • J. Forstadius, O. Lassila, T. Seppanen: "RDF-Based Model for Context-Aware Reasoning in Rich Service Environment". PerCom Workshops 2005: pp. 15-19
    • (2005) PerCom Workshops , pp. 15-19
    • Forstadius, J.1    Lassila, O.2    Seppanen, T.3
  • 19
    • 11244257278 scopus 로고    scopus 로고
    • A Policy Based Context-aware Service for Next Generation Networks
    • 8-10 Sept, London
    • K. Jean, K. Yang, A. Galis, -"A Policy Based Context-aware Service for Next Generation Networks", 8th London Communication Symposium, 8-10 Sept 2003, London
    • (2003) 8th London Communication Symposium
    • Jean, K.1    Yang, K.2    Galis, A.3
  • 22
    • 84948995473 scopus 로고    scopus 로고
    • A Context-Aware Security Architecture for Emerging Applications
    • M. J. Covington, P. Fogla, Z. Zhan, M. Ahamad: "A Context-Aware Security Architecture for Emerging Applications". ACSAC 2002: pp. 249-260
    • ACSAC 2002 , pp. 249-260
    • Covington, M.J.1    Fogla, P.2    Zhan, Z.3    Ahamad, M.4
  • 24
    • 34748917283 scopus 로고    scopus 로고
    • Oracle Technology Network, http://www.oracle.com/technology/products/ intermedia/index.html, (20/09/2006)
    • Oracle Technology Network, http://www.oracle.com/technology/products/ intermedia/index.html, (20/09/2006)
  • 26
    • 20844435938 scopus 로고    scopus 로고
    • A Trust-Based Context-Aware Access Control Model for Web-Services
    • R. Bhatti, E. Bertino, A. Ghafoor: "A Trust-Based Context-Aware Access Control Model for Web-Services". Distributed and Parallel Databases 18(1) 2005, pp. 83-105
    • (2005) Distributed and Parallel Databases , vol.18 , Issue.1 , pp. 83-105
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3
  • 27
    • 34748863820 scopus 로고    scopus 로고
    • Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach
    • R. Wolf, M. Schneider: "Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach". MMM-ACNS 2003: pp. 267-278
    • (2003) MMM-ACNS , pp. 267-278
    • Wolf, R.1    Schneider, M.2
  • 29
    • 34748865112 scopus 로고    scopus 로고
    • DB2 Image Extenders, QBIC, http://wwwqbic.almaden.ibm.com/ (27/12/2006)
    • DB2 Image Extenders, QBIC, http://wwwqbic.almaden.ibm.com/ (27/12/2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.