Content-based protection and release access control
نویسنده
چکیده
منابع مشابه
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations
The successful operation of NATO missions requires the effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to unauthorized users. To resolve the conflict between confidentiality and availability in a dynamic coalition and network environment while being able to dynamically respond to changes in p...
متن کاملA Learning-based Approach to Information Release Control
Controlled release of information from an organization is becoming important from various considerations: privacy, competitive information protection, strategic data control, and more. In most organizations, data protection is afforded only by using access control. However, it can be argued that access control suffers from at least two problems. First, effective access control assumes a perfect...
متن کاملHierarchical Access Control and Content Protection in Medical Image Archives, Based on Inverse Pyramid Decomposition
In the paper is presented one new approach for management of medical databases with multi-layer access, based on the Inverse Pyramid Decomposition. This decomposition offers the ability for the development of interactive tools for multi-layer transfer of the processed visual information with consecutively quality improvement, selection of regions of interest, which to be directly accessed and r...
متن کاملA Hierarchical Protection Model for Protecting against Executable Content
Executable content poses a threat of unauthorized access because it contains program code running on the user’s machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and th...
متن کاملConstructing a Wrapper-Based DRM System for Digital Content Protection in Digital Libraries
Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods, however, have drawbacks. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attack. Thus, how to enf...
متن کامل