Content-based protection and release access control

نویسنده

  • Shihao Zhao
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations

The successful operation of NATO missions requires the effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to unauthorized users. To resolve the conflict between confidentiality and availability in a dynamic coalition and network environment while being able to dynamically respond to changes in p...

متن کامل

A Learning-based Approach to Information Release Control

Controlled release of information from an organization is becoming important from various considerations: privacy, competitive information protection, strategic data control, and more. In most organizations, data protection is afforded only by using access control. However, it can be argued that access control suffers from at least two problems. First, effective access control assumes a perfect...

متن کامل

Hierarchical Access Control and Content Protection in Medical Image Archives, Based on Inverse Pyramid Decomposition

In the paper is presented one new approach for management of medical databases with multi-layer access, based on the Inverse Pyramid Decomposition. This decomposition offers the ability for the development of interactive tools for multi-layer transfer of the processed visual information with consecutively quality improvement, selection of regions of interest, which to be directly accessed and r...

متن کامل

A Hierarchical Protection Model for Protecting against Executable Content

Executable content poses a threat of unauthorized access because it contains program code running on the user’s machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and th...

متن کامل

Constructing a Wrapper-Based DRM System for Digital Content Protection in Digital Libraries

Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods, however, have drawbacks. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attack. Thus, how to enf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017