نتایج جستجو برای: digital public control
تعداد نتایج: 1933416 فیلتر نتایج به سال:
Television production has shifted rapidly from an analog process to one where virtually all programs are created and finalized as digital files. Such productions in public television are at great risk of being lost, because practices for long-term preservation of digital video are just now emerging, and because there is no mandate for preservation within the public broadcasting system. NDIIPP f...
background : due to rapid advances in modern technologies such as telecommunication technology, the world has witnessed an exponential growth in the use of digital handheld devices (e.g. smartphones and tablets). this drastic growth has resulted in increased global concerns about the safety of these devices. smartphones, tablets, laptops, and other digital screens emit high levels of short-wave...
This paper describes an experimental digital rights management architecture which uses digital watermarking and encryption to protect the content. In addition to cryptographically protected media content, the deliverable package can also include a teaser that the user is allowed to consume freely. The content is identified with an attack-resistant watermark that is used to automatically acquire...
objective: in the this research, effective factors on digital libraries’ development in central libraries of public universities in tehran have been identified from these libraries administrator’s view.method: this study is applied, based on descriptive-analytical method. for data collection we used researcher-made questionnaire, based on the digital library federation definition (including hum...
This paper contrasts the use of an ID PKI (Public Key Infrastructure) with the use of delegatable, direct authorization. It first addresses some commonly held beliefs about an ID PKI – that you need a good ID certificate to use digital signatures, that the ID certificate should come from a CA that has especially good private key security, that use of the ID certificate allows you to know with w...
QCM stands for `Query Certi cate Manager'; it is a software system that has been developed at the University of Pennsylvania as part of the SwitchWare project on active networks. QCM is a Public Key Infrastructure (PKI) intended to support secure maintenance of distributed data sets like Access Control Lists (ACL's) or public key certi cate repositories. An ACL is a list of `principals', identi...
The present research compared the experiences and outcomes afforded by digital and non-digital games. In a randomized experiment, a sample of youth, ages 11-17, played a cooperative public health game presented in either a non-digital format (board game) or digital format (mobile app). Relative to baseline scores reported in a no-game control condition (N = 30), players of the non-digital versi...
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do not address user privacy at all, while anonymous credentials that protect user privacy are complex and have compatibility problems with existing PKIs. In this paper we propose privacy-preserving credentials, a concept bet...
In our quest to give users uniform access to resources unimpeded by administrative boundaries, we discovered that we needed transitive sharing among users, with the possibility of restricted access along each sharing link. To achieve that goal, we extend Lampson et al.’s calculus for access control to support restricted delegations. We discuss the advantages of our extension, including the simp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید