1,133 Hits in 5.9 sec

A temporal key management scheme for secure broadcasting of XML documents

Elisa Bertino, Barbara Carminati, Elena Ferrari
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
scheme enabling an efficient secure broadcasting of XML documents.  ...  With respect to our previous work, the most relevant innovative contribution of this paper is the support for secure document broadcasting and the related key management scheme, and the support for temporal  ... 
doi:10.1145/586115.586116 fatcat:xvh4azqqtfdldfmovddyxdhtxi

A temporal key management scheme for secure broadcasting of XML documents

Elisa Bertino, Barbara Carminati, Elena Ferrari
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
scheme enabling an efficient secure broadcasting of XML documents.  ...  With respect to our previous work, the most relevant innovative contribution of this paper is the support for secure document broadcasting and the related key management scheme, and the support for temporal  ... 
doi:10.1145/586110.586116 dblp:conf/ccs/BertinoCF02 fatcat:mtu4uv7lrvboho7jw7xlgwvlai

Applying hierarchical and role-based access control to XML documents

Jason Crampton
2004 Proceedings of the 2004 workshop on Secure web service - SWS '04  
We also describe how techniques for assigning keys to a security lattice can be adapted to minimize the number of keys that are distributed to users, and compare our approach with two other access control  ...  This approach is applicable to broadcast XML data and also provides a lightweight method for implementing a more conventional access control mechanism that responds to user access requests.  ...  ACKNOWLEDGEMENTS A preliminary version of this paper appeared in the Proceedings of the 2004 ACM Workshop on Secure Web Services.  ... 
doi:10.1145/1111348.1111353 dblp:conf/sws/Crampton04 fatcat:fuiw2zykf5dcbdvl26qfeizgju

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

E. Bertino, Ning Shang, S.S. Wagstaff
2008 IEEE Transactions on Dependable and Secure Computing  
This requires an efficient way to manage the encryption keys. In this scenario, time-bound key management schemes for a hierarchy were proposed by Tzeng and Chien in 2002 and 2005, respectively.  ...  Both schemes are insecure against collusion attacks. In this paper, we propose a new key assignment scheme for access control which is both efficient and secure.  ...  The authors thank the Center for Education and Research in Information Assurance and Security at Purdue University for support.  ... 
doi:10.1109/tdsc.2007.70241 fatcat:nrouo4mh3zgwfhj2e5q6rh6k6y

Towards Secure Content Based Dissemination of XML Documents

Mohammad Ashiqur Rahaman, Henrik Plate, Yves Roudier, Andreas Schaad
2009 2009 Fifth International Conference on Information Assurance and Security  
This infrastructure leverages our earlier scheme [1] for protecting the integrity and confidentiality of XML content during dissemination.  ...  This paper describes a publish/subscribe middleware infrastructure to achieve a content-based dissemination of XML documents.  ...  This is addressed by (a) the encryption of published XML information, supported by a distributed key management and (b) an ontology-based authorization scheme that supports access control and dissemination  ... 
doi:10.1109/ias.2009.138 dblp:conf/IEEEias/RahamanPRS09 fatcat:okeoq5kqzzc6db3wkikcvaxtl4

Research on Data Synchronization Technology of Embedded Mobile Database

Changai Chen, Xiaohui Wang
2015 Open Automation and Control Systems Journal  
The Cache Management of mobile device is based on the mobile database running on multi-disk broadcast environment, which is characterized as not requiring upload channel.  ...  This paper stresses on the Management algorithm of Client Cache in Embedded Mobile Database, and mainly extends on three aspects: the Replacement Algorithm, Prefetching Algorithm, and non-consistency of  ...  visit and waiting time, for example, broadcast cycle for 1600 broadcast unit broadcasting system, in a no local cache, the client response a request for access the average time is probably the entire cycle  ... 
doi:10.2174/1874444301507011827 fatcat:4xfwua5ki5b5bk7x54ykpvtphm

Designing Ubiquitous Personalized TV-Anytime Services

Fotis G. Kazasis, Nektarios Moumoutzis, Nikos Pappas, Anastasia Karanastasi, Stavros Christodoulakis
2003 International Conference on Advanced Information Systems Engineering  
The architecture allows content based matching and/or retrieval based on the description of the broadcast or parts of the broadcast according to the interests of the viewers.  ...  This environment is based on extended TV sets with a large capacity disk and Internet connection.  ...  Acknowledgements The work presented in this paper has been carried out in the scope of the EUfunded project (IST-1999-20751) UP-TV: "Ubiquitous personalized interactive Multimedia TV Systems and Services  ... 
dblp:conf/caise/KazasisMPKC03 fatcat:jg2vxdvnhnagng3gkrmra35yvi

A Framework for Customizable Sports Video Management and Retrieval [chapter]

Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham
2003 Lecture Notes in Computer Science  
Secondly, we will show how the extracted key segments can be summarised using standard descriptions of MPEG-7 in a hierarchical scheme which is potentially easy to share between users.  ...  In this paper, we firstly propose a framework for customizable video management system which allows the system to detect the type of video to be indexed, so that appropriate tools can be used to extract  ...  Although XML was not initially designed to make a new database scheme, but since XML documents contain a collection of data, in the strictest sense of term, it is a database [15] and therefore designing  ... 
doi:10.1007/978-3-540-39666-6_16 fatcat:izz62pdtibfppgyj6bhtdi4e3u

Broker-Based Secure Negotiation of Intellectual Property Rights [chapter]

Jaime Delgado, Isabel Gallego, Xavier Perramon
2001 Lecture Notes in Computer Science  
In the area of e-commerce of multimedia content, protection and management of Intellectual Property Rights (IPR) is a key issue.  ...  We are developing an a pplication that represents IPR information using metadata and uses a specific protocol for negotiation purposes.  ...  Every user of the system has a pair of keys (private/public) for generating signatures.  ... 
doi:10.1007/3-540-45439-x_34 fatcat:mj4es47exjhovetuodfhfnnbre

Self-Protecting Documents for Cloud Storage Security

Manuel Munier, Vincent Lalanne, Magali Ricarde
2012 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications  
Using such self-protecting documents, a company can ensure security and privacy for its documents when outsourcing storage services (e.g. cloud).  ...  For this we encapsulate within the document itself some security components (e.g. access control, usage control) to achieve an autonomic document architecture for Enterprise DRM (E-DRM).  ...  The document then starts the security kernel of our architecture which will in turn initiate various security modules: a access control module, a metadata management module, a trustworthiness management  ... 
doi:10.1109/trustcom.2012.261 dblp:conf/trustcom/MunierLR12 fatcat:x5fagd7porckvhuyeypirydiyu

Overview of the MPEG-7 standard

Shih-Fu Chang, T. Sikora, A. Purl
2001 IEEE transactions on circuits and systems for video technology (Print)  
It aims to support and facilitate a wide range of applications, such as media portals, content broadcasting, and ubiquitous multimedia.  ...  MPEG-7, formally known as Multimedia Content Description Interface, includes standardized tools (descriptors, description schemes, and language) enabling structural, detailed descriptions of audio-visual  ...  Techniques developed in W3C for signing XML documents and solutions used for MPEG-4 IPMP support are being considered.  ... 
doi:10.1109/76.927421 fatcat:ghj4a2ou2bdcxdjv3surnpvisq


Machigar Ongtang, Kevin Butler, Patrick McDaniel
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
c) access is regulated by contextual constraints, e.g., used for a limited time, a maximum number of viewings, etc.  ...  In this paper, we explore the requirements and enforcement of digital rights management (DRM) policy on smart phones.  ...  The identity for participant a is denoted I a , the public/private key pair for a is K + a and K − a respectively, content is m, and a policy for m is p m .  ... 
doi:10.1145/1920261.1920295 dblp:conf/acsac/OngtangBM10 fatcat:w7udtvgcefh6bdf5wqq6z2qi5i

Designing annotation before it's needed

Frank Nack, Wolfgang Putz
2001 Proceedings of the ninth ACM international conference on Multimedia - MULTIMEDIA '01  
This paper considers the automated and semi-automated annotation of audiovisual media in a new type of production framework, A4SM (Authoring System for Syntactic, Semantic and Semiotic Modelling).  ...  We present the architecture of the framework and outline the underlying XML-Schema based content description structures of A4SM.  ...  , extraction of metadata, key frame extraction and generation of frame-accurate low-res proxies for browsing and rough cut • A content management system that accepts all this information and allows immediate  ... 
doi:10.1145/500178.500180 fatcat:bfg34nkaonaubby7kmjtsy3zlq

Contents Page

2013 Epidemiologic Reviews  
Key concepts and basic approach The REL adopts a simple and extensible data model for many of its key concepts and elements.  ...  DII provides a schema that can be used to include identifiers into a Digital Item Declaration.  A method how to uniquely identify Description Schemes (using XML namespaces).  ...  A.4.3 Society of Motion Picture and Television Engineers (SMPTE) The SMPTE 330M-2000 Television -Unique Material Identifier (UMID) standard describes a unique identifier scheme for use in a broadcast environment  ... 
doi:10.1093/epirev/mxs015 fatcat:tkblkwc5rvgorayu3f5cv5dxaa

A graphics architecture for high-end interactive television terminals

Pablo Cesar, Petri Vuorimaa, Juha Vierinen
2006 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
Some of the services intended for these devices include, for example, games and enhanced information over broadcasted video.  ...  The GUI toolkit is a set of ready-made user interface widgets and layout schemes. Finally, high-level languages are easy-to-use tools for developing simple services.  ...  The second is a more complex profile that supports advanced user interaction (i.e., XForms) and the temporal dimension (i.e., SMIL) of XML documents.  ... 
doi:10.1145/1201730.1201735 fatcat:7n34r3g3ejckncehdypck4744m
« Previous Showing results 1 — 15 out of 1,133 results