-
1
-
-
12244313247
-
Video query processing in the VDBMS testbed for video database research
-
New Orleans, LA, USA
-
W. Aref, M. Hammad, A. C. Catlin, L. Llyas, T. Ghanem, A. Elmagarmid, and M. Marzouk, "Video query processing in the VDBMS testbed for video database research," in Proceedings of the First ACM International Workshop on Multimedia Databases, pp. 25-32, New Orleans, LA, USA, 2003.
-
(2003)
Proceedings of the First ACM International Workshop on Multimedia Database
, pp. 25-32
-
-
Aref, W.1
Hammad, M.2
Catlin, A.C.3
Llyas, L.4
Ghanem, T.5
Elmagarmid, A.6
Marzouk, M.7
-
3
-
-
85139710833
-
An access control model for video database systems
-
McLean, Virginia, United States
-
E. Bertino, M. Hammad, W. Aref, and A. Elmagarmjd, "An access control model for video database systems," in Proceedings of the Ninth International Conference on Information and Knowledge Management, pp. 336-343, McLean, Virginia, United States, 2000.
-
(2000)
Proceedings of the Ninth International Conference on Information and Knowledge Manage-ment
, pp. 336-343
-
-
Bertino, E.1
Hammad, M.2
Aref, W.3
Elmagar-mjd, A.4
-
4
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari, "TRBAC: A temporal role-based access control model," ACM Transactions on Information and System Security (TISSEC), vol. 4, issue 3, pp. 191-233, Aug. 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
5
-
-
2442563871
-
A hierarchical access control model for video database system
-
E. Bertino, J. Fan, E. Ferrari, M. S. Hacid, A. Elmagarmjd, and X. Zhu, "A hierarchical access control model for video database system," ACM Transactions on Information System, vol. 21, no. 2, pp. 155-191, 2003.
-
(2003)
ACM Transactions on Information System
, vol.21
, Issue.2
, pp. 155-191
-
-
Bertino, E.1
Fan, J.2
Ferrari, E.3
Hacid, M.S.4
Elmagarmjd, A.5
Zhu, X.6
-
6
-
-
0002923966
-
Decentralized trust management
-
Oakland, CA
-
M. Blaze, J. Feignhbaum, and J. Lacy, "Decentralized trust management," IEEE Symposium on Secu-rity and Privacy, pp. 17-28, Oakland, CA, May 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 17-28
-
-
Blaze, M.1
Feignhbaum, J.2
Lacy, J.3
-
7
-
-
84957800809
-
Trust management of public-key infras-tructures
-
Cambridge UK
-
M. Blaze, J. Feignhbaum, and A. D. Keromytis, "KeyNote: Trust management of public-key infras-tructures," in Security Protocals, 6th International Workshop, pp. 59-63, Cambridge UK, 1998.
-
(1998)
Security Protocals, 6th International Workshop
, pp. 59-63
-
-
Blaze, M.1
Feignhbaum, J.2
Keromytis, A.D.3
-
8
-
-
0004078695
-
-
Internet Drafft RFC 2704
-
M. Blaze, J. Feignhbaum, J. Ioannidis, and A. D. Keromytis, The KeyNote Trust Management System, Version 2, Internet Drafft RFC 2704, Sep. 1999.
-
(1999)
The KeyNote Trust Management System
, vol.2
-
-
Blaze, M.1
Feignhbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
10
-
-
12244300374
-
Implementing an access control system for SVG documents
-
Catania, Italy
-
E. Fernandez-Medina, G. Ruiz, and S. De Capitani di Vimerati, "Implementing an access control system for SVG documents," in Lecture Notes in Computer Science, pp. 741-753, Catania, Italy, 2003.
-
(2003)
Lecture Notes in Computer Science
, pp. 741-753
-
-
Fernandez-Medina, E.1
Ruiz, G.2
De Capitani di Vimerati, S.3
-
12
-
-
33744542291
-
Characteristics of role-based access con-trol, symposium on access control models and tech-nologies
-
Gaithersburg, Maryland, United States
-
V. Gligor, "Characteristics of role-based access con-trol, symposium on access control models and tech-nologies," in Proceedings of the First ACM Work-shop on Role-based Access Control, no. 10, pp. 9-14, Gaithersburg, Maryland, United States, 1996.
-
(1996)
Proceedings of the First ACM Work-shop on Role-based Access Control
, vol.10
, pp. 9-14
-
-
Gligor, V.1
-
13
-
-
84874838173
-
-
HTTP Cookies
-
HTTP Cookies: http://www.netscape.com/newsref /std/cookies spec.html.
-
-
-
-
14
-
-
84874926502
-
-
ISO/IEC JTC1/SC29/WG11N5525, MPEG-Overview
-
ISO/IEC JTC1/SC29/WG11N5525, MPEG-Overview (Version 9), http://www.chiariglione.org/mpeg/standards/mpeg-7/mpeg-7.htm
-
, vol.9
-
-
-
15
-
-
14844358479
-
-
CECPress, Boca Taton London, New York Washington, D.C.
-
H. Kosch, Distributed Multimedia Database Tech-nologies Supported by MPEG-7 and MPEG-21, CECPress, Boca Taton London, New York Washington, D.C., 2004.
-
(2004)
Distributed Multimedia Database Tech-nologies Supported by MPEG-7 and MPEG-21
-
-
Kosch, H.1
-
17
-
-
0003769779
-
-
John Wiley & Sons, Ltd
-
B. S. Manjunath, P. Salembier, and T. Sikora, Intro-duction to MPEG-7 Multimedia Content Description Interface, John Wiley & Sons, Ltd., 2002.
-
(2002)
Intro-duction to MPEG-7 Multimedia Content Description Interface
-
-
Manjunath, B.S.1
Salembier, P.2
Sikora, T.3
-
19
-
-
12244289926
-
-
Las Vegas, Nevada, USA
-
L. Pan and C. N. Zhang, "Using metadata to protect the audiovisual contents in MPEG-7 applications, in SAM'04, pp. 287-293, Las Vegas, Nevada, USA, 2004.
-
(2004)
Using metadata to protect the audiovisual contents in MPEG-7 applications, in SAM'04
, pp. 287-293
-
-
Pan, L.1
Zhang, C.N.2
-
20
-
-
0035364475
-
MPEG-7 multimedia description schemes
-
P. Salembier and J. R. Smith, "MPEG-7 multimedia description schemes," IEEE Transactions on Circuits and Systems for Video technology, vol. 11, no. 6, pp. 748-759, 2001.
-
(2001)
IEEE Transactions on Circuits and Systems for Video technology
, vol.11
, Issue.6
, pp. 748-759
-
-
Salembier, P.1
Smith, J.R.2
-
21
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
22
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Transactions on Information and Systems Security (TISSEC), vol. 2, no. 1, pp. 105-135, 1999.
-
(1999)
ACM Transactions on Information and Systems Security (TISSEC)
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
|