Filters








22,634 Hits in 5.8 sec

Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control

Tatsuya Fujimoto, Keiichi Iwamura, Masaki Inamura
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
We have proposed a copyright protection technology suitable for editable  ...  In Section 3, we propose a new edit control scheme for realizing diversion control and composition control between contents in addition to the edit control within a content.  ...  Our new scheme can control edit such as diversion of partial contents to other contents, and it can also control the composition of contents.  ... 
doi:10.5220/0005994501160123 dblp:conf/icete/FujimotoII16 fatcat:3xy6qg47krgudax3opijeq4k7a

Deployment of Contents Protection Scheme using Digital Signature

Daichi Tanaka, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
With the recent progress in social media and Internet technology,  ...  In future work, we will extend the functions to handle addition, deletion, and diversion of partial contents and the composition of contents, which includes all the functions in the scheme presented in  ...  It allows an author to control changes, deletions, additions, and diversions in each portion of his/her contents, and to control also the composition of the contents themselves using signatures.  ... 
doi:10.5220/0006472501300137 dblp:conf/icete/TanakaIIK17 fatcat:nvdhkprdurezlknhv4r57gxjym

Design Patterns for Multiple Stakeholders in Social Computing [chapter]

Pooya Mehregan, Philip W. L. Fong
2014 Lecture Notes in Computer Science  
In social computing, multiple users may have privacy stakes in a content (e.g., a tagged photo). They may all want to have a say on the choice of access control policy for protecting that content.  ...  The study of protection schemes for multiple stakeholders in social computing has captured the imagination of researchers, and general-purpose schemes for reconciling the differences of privacy stakeholders  ...  This work is supported in part by an NSERC Discovery Grant and a Canada Research Chair.  ... 
doi:10.1007/978-3-662-43936-4_11 fatcat:i5b72prpjzgmpdzf3gkrrl4qoa

DOLAR: virtualizing heterogeneous information spaces to support their expansion

Kostas Saidis, Yannis Smaragdakis, Alex Delis
2011 Software, Practice & Experience  
In addition, the suggested virtual object composition schemes help decouple business-logic from any content origin, storage and/or structural details, allowing applications to support novel types of items  ...  Such user-specified virtual objects align to storage artifacts and help realize uniform "store-to-user" data-flows atop heterogeneous sources, while offering the reverse "user-tostore" flows with identical  ...  ACKNOWLEDGEMENTS We would like to thank the anonymous reviewers for their comments that helped us improve the presentation of our work. We also wish to thank G. Pyrounakis, V. Karakoidas and E.  ... 
doi:10.1002/spe.1050 fatcat:6ewpephjk5cvzppbogncqvfbya

Security in Collaborative Multimedia Web-based Art Projects

Dimitrios K. Koukopoulos, Georgios D. Styliaras
2010 Journal of Multimedia  
Digital certification mechanism ensures the secure content transfers among users and multimedia content server through Web.  ...  Digital watermarking mechanism handles copyright-protection and authentication issues that appear in multimedia systems applying a semantically secure watermark.  ...  To realize the four business models described in Section III, the Two-Right scheme is proposed for watermarking the multimedia content.  ... 
doi:10.4304/jmm.5.5.404-416 fatcat:sjb7634ljvbb7mau5nkzsyk3pm

Architectures and Bandwidth Allocation Schemes for Hybrid Wireless-Optical Networks

Antonios G. Sarigiannidis, Maria Iloridou, Petros Nicopolitidis, Georgios Papadimitriou, Fotini-Niovi Pavlidou, Panagiotis G. Sarigiannidis, Malamati D. Louta, Vasileios Vitsas
2015 IEEE Communications Surveys and Tutorials  
We provide a comprehensive compilation of the latest architectures, integrated technologies, QoS features, and dynamic bandwidth allocation (DBA) schemes.  ...  Hence, they are capable of increasing revenue levels and facilitating commercial penetration to the telecom market.  ...  ACKNOWLEDGMENT This research has been co-financed by the European Union (European Social Fund -ESF) and Greek national funds through the Operational  ... 
doi:10.1109/comst.2014.2356640 fatcat:ezkbm7rbincmzhv54764odjncy

A Review of Blockchain-Based Access Control for the Industrial IoT

Peng Zhai, Liping Zhang, Jingsha He
2021 Converter  
protection, etc.  ...  In this paper, firstly the basic concepts of access control and blockchain are explained, and the existing access control model and method based on blockchain in the industrial IoT scenario are summarized  ...  Identity authentication and access control to resources and services are the main means to protect the security of the IoT.  ... 
doi:10.17762/converter.62 fatcat:lvtb7ozgvfb4nipdx7hm2hnssm

DESIGNING DIVERSIFIED CROPPING SYSTEMS IN CHINA: THEORY, APPROACHES AND IMPLEMENTATION

2021 Frontiers of Agricultural Science and Engineering  
environmental protection.  ...  This paper presents a theoretical framework of theory, approaches and implementation of crop diversification schemes in China.  ...  Please note that technical editing may introduce minor changes to the manuscript text and/or graphics which may affect the content, and all legal disclaimers that apply to the journal pertain.  ... 
doi:10.15302/j-fase-2021392 fatcat:hbr7ddj4unfb7hpvegsikfmu3i

Region-Level Image Authentication Using Bayesian Structural Content Abstraction

Wei Feng, Zhi-Qiang Liu
2008 IEEE Transactions on Image Processing  
A good IA system should be able to tolerate non content-changing operations (NCOs) robustly, and detect content-changing operations (COs) sensitively.  ...  Both theoretical analysis and experimental results demonstrate that our BaSCA scheme has much less false positive and comparable false negative probability, as compared to state-of-the-art IA methods.  ...  In contrast, the proposed scheme was most robust to diverse NCOs, including low-to-medium quality JPEG compression, median filtering, Gaussian noise and scaling.  ... 
doi:10.1109/tip.2008.2006435 pmid:19004713 fatcat:cskpljhujveq5h2fkke6kqp5y4

Expert System for Sintering Process Control [chapter]

Xiaohui Fan, Xuling Chen, Yi Wang
2010 Expert Systems  
Diversity and complexity of sintering process control knowledge lead to the incompetence of single knowledge representation.  ...  Diversity and complexity of sintering process control knowledge lead to the incompetence of single knowledge representation.  ... 
doi:10.5772/7073 fatcat:wgnhccbzrbbgnh4dzqhs4bfbvq

Data Security and Privacy Protection for Cloud Storage: A Survey

Pan Yang, Neal N. Xiong, Jingli Ren
2020 IEEE Access  
Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system.  ...  Currently, the governments, enterprises and individual users are actively migrating their data to the cloud. Such a huge amount of data can create magnanimous wealth.  ...  Due to the diversity of cloud data, conventional privacy-preserving mechanisms are unable to provide comprehensive privacy protection in the cloud.  ... 
doi:10.1109/access.2020.3009876 fatcat:6kcb3junlzhvvcq3qhztumpdqq

Advances in ubiquitous media technologies and applications

Rynson W. H. Lau, Ralf Klamma, Shu-Ching Chen, Benjamin Wah
2011 World wide web (Bussum)  
Web and knowledge grid, ubiquitous multimedia content protection and security, privacy and security in ubiquitous environments need to be developed.  ...  These include designing and developing a) heterogeneous ubimedia infrastructures and architectures for delivering multimedia content including streaming devices; b) sensor technology including wearable  ... 
doi:10.1007/s11280-011-0123-7 fatcat:gt4oac5qgjfu3muhxd6xk655rq

How to Control Coastal Zone Through Spatial Planning? Taking the Construction of the Spatial Monitoring Index System of the Coastal Zone in China as an Example

Zelian Guo, Yecui Hu, Yuping Bai, Lei Yang, Jieyong Wang
2022 Frontiers in Environmental Science  
Then, adopting the methods of "multiple planning integration" and expert consultation and using the research idea of "setting control objectives, contents, and indicators," an index system suitable for  ...  Scientific space control is needed to ensure the harmonious development of the "human-land-ocean" system in this region.  ...  The contents of control include coastline management and control and ecological restoration, fishery space supply and management, coastal zone industrial parks and marine economy, marine disaster prevention  ... 
doi:10.3389/fenvs.2022.876414 fatcat:gtswz2x6dbgmzotqupvjt6wdhm

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
, cyberspace security, cryptography, network security, information system security and information content security.  ...  This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself  ...  We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun.  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

Concepts, Structure and Developments of High-Reliability Cyber-Physical Fusion Based Coordinated Planning for Distribution System

Chong Gao, Tianlin Wang, Huazhen Cao, Ziyao Wang, Tao Yu, Ran Cheng
2021 Frontiers in Energy Research  
Coordinated control is imperative for the distribution network with the integration of wind power, photovoltaic system, and energy storage system.  ...  Meanwhile, the advanced automation terminal, intelligent control technology, and information communication technologies have greatly promoted the informatization of distribution networks which also increase  ...  protection unit, and control unit.  ... 
doi:10.3389/fenrg.2021.697959 fatcat:qipogxf6lrgx7dz47alzwpjrgu
« Previous Showing results 1 — 15 out of 22,634 results