Reducing Unauthorized Modification of Digital Objects

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Modification of the Mumford-Shah Functional for Segmentation of Digital Images with Fractal Objects

In this paper we revisit the Mumford-Shah functional, one of the most studied variational approaches to image segmentation. The contribution of this work is to propose a modification of the Mumford-Shah functional that includes Fractal Analysis to improve the segmentation of images with fractal or semifractal objects. Here we show how the fractal dimension is calculated and embedded in the func...

متن کامل

Unauthorized Version

A 'mole' at the Bristol Royal Infirmary tells me that at the last Hospital Committee Meeting it was explained to the assembled consultants that under the rules of the new Special Trust, when they have fulfilled the Provider contract for the number of patients to be seen in a particular week, they will not be allowed to see any more.

متن کامل

A Formalisation of Encapsulated Modification of Objects

Currently existing formalisations of object orientation are unsatisfactory w.r.t. inheritance. This is due to an inherent conflict between inheritance and encapsulation. To solve this conflict, we present a formal model with a clear syntactic distinction between “inheritable entities” and objects. This model naturally gives rise to two types of incremental modification of objects without compro...

متن کامل

Digital Objects as Passwords

Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of generating such passwords, or memorizing a random-looking, machine-generated one for longterm use. Infrequently used passwords pose even bigger security and usability problems. We exploit the fact that many users now own or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Software Engineering

سال: 2012

ISSN: 0098-5589

DOI: 10.1109/tse.2011.7