-
1
-
-
0036510173
-
A content-based authorization model for digital libraries
-
N. Adam, V. Atluri, E. Bertino, and E. Ferrari. A content-based authorization model for digital libraries. IEEE Transactions Knowledge and Data Engineering, 14(2):296-315, 2002.
-
(2002)
IEEE Transactions Knowledge and Data Engineering
, vol.14
, Issue.2
, pp. 296-315
-
-
Adam, N.1
Atluri, V.2
Bertino, E.3
Ferrari, E.4
-
2
-
-
26444534381
-
Towards privacy-enhanced authorization policies and languages
-
C. A. Ardagna, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Towards privacy-enhanced authorization policies and languages. In DBSec, pages 16-27, 2005.
-
(2005)
DBSec
, pp. 16-27
-
-
Ardagna, C.A.1
Damiani, E.2
Di Vimercati, S.D.C.3
Samarati, P.4
-
3
-
-
34748907891
-
Mca2cm: Multimedia context aware access control model
-
B. A. Bouna, R. Chbeir, and J. Miteran. Mca2cm: Multimedia context aware access control model. In Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics ISI. ISI, New Jersey, USA, 2007.
-
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics ISI. ISI, New Jersey, USA, 2007
-
-
Bouna, B.A.1
Chbeir, R.2
Miteran, J.3
-
4
-
-
34748914494
-
Towards fully functional distributed multimedia dbms
-
September
-
G. Chalhoub, S. Saad, R. Chbeir, and K. Yetongnon. Towards fully functional distributed multimedia dbms. Journal Of Digital Information Management (JDIM), 2(3):116-121, September 2004.
-
(2004)
Journal of Digital Information Management (JDIM)
, vol.2
, Issue.3
, pp. 116-121
-
-
Chalhoub, G.1
Saad, S.2
Chbeir, R.3
Yetongnon, K.4
-
5
-
-
85082026569
-
Access control of svg documents
-
E. Damiani, S. D. C. di Vimercati, E. Fernández-Medina, and P. Samarati. Access control of svg documents. In DBSec 2002, pages 219-230, 2002.
-
(2002)
DBSec 2002
, pp. 219-230
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Fernández-Medina, E.3
Samarati, P.4
-
7
-
-
77954009071
-
-
DB2 12
-
DB2. Image extenders, qbic, http://wwwqbic.almaden.ibm.com/, 12 2006.
-
(2006)
Image Extenders
-
-
-
9
-
-
77953978126
-
-
10
-
Efg2. Image processing labs, http://www.efg2.com/lab/library/ imageprocessing/, 10 2006.
-
(2006)
Image Processing Labs
-
-
-
10
-
-
0034996152
-
Approximate nearest neighbor searching in multimedia databases
-
April
-
H. Ferhatosmanoglu, E. Tuncel, D. Agrawal, and A. E. Abbadi. Approximate nearest neighbor searching in multimedia databases. In In Proc of 17th IEEE Int. Conf. on Data Engineering (ICDE), Heidelberg,Germany, pages 503-511, April 2001.
-
(2001)
Proc of 17th IEEE Int. Conf. on Data Engineering (ICDE), Heidelberg,Germany
, pp. 503-511
-
-
Ferhatosmanoglu, H.1
Tuncel, E.2
Agrawal, D.3
Abbadi, A.E.4
-
11
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34-64, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
13
-
-
77954000293
-
-
10
-
C. Garrett. Asp alliance: http://aspalliance.com/404 image web service/, 10 2006.
-
(2006)
-
-
Garrett, C.1
-
14
-
-
77953968889
-
-
Java. Community press 11
-
Java. Community press, http://jcp.org/en/jsr/detail?id=135, 11 2006.
-
(2006)
-
-
-
15
-
-
11044223672
-
Access-control language for multidomain environments
-
J. Joshi, R. Bhatti, E. Bertino, and A. Ghafoor. Access-control language for multidomain environments. IEEE Internet Computing, 8(6):40-50, 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
16
-
-
0019608720
-
Formal models of computer security
-
September
-
C. E. Landwehr. Formal models of computer security. ACM Comput. Surv., 13(3):247-278, September 1981.
-
(1981)
ACM Comput. Surv.
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
18
-
-
77953994207
-
-
09
-
Oracle. Intermedia technology: http://www.oracle.com/technology/products/ intermedia/, 09 2006.
-
(2006)
Intermedia Technology
-
-
-
19
-
-
63649149206
-
Logic, knowledge representation, and bayesian decision theory
-
D. Poole. Logic, knowledge representation, and bayesian decision theory. In In Proceedings of CL-2000, pages 70-86, 2000.
-
(2000)
Proceedings of CL-2000
, pp. 70-86
-
-
Poole, D.1
-
21
-
-
34748881498
-
Colour object recognition combining motion descriptors, zernike moments and support vector machine
-
F. Smach, C. Lemaitre, J. Miteran, J. Gauthier, and M. Atri. Colour object recognition combining motion descriptors, zernike moments and support vector machine. In Proceedings of IECON'06, IEEE, Paris-CNAM, France, pages 3238-3242, 2006.
-
(2006)
Proceedings of IECON'06, IEEE, Paris-CNAM, France
, pp. 3238-3242
-
-
Smach, F.1
Lemaitre, C.2
Miteran, J.3
Gauthier, J.4
Atri, M.5
-
22
-
-
4143061356
-
A role-based approach to access control for xml databases
-
J. Wang and S. L. Osborn. A role-based approach to access control for xml databases. In SACMAT 2004, pages 70-77, 2004.
-
(2004)
SACMAT 2004
, pp. 70-77
-
-
Wang, J.1
Osborn, S.L.2
|