Sciweavers

464 search results - page 43 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
98
Voted
ISMIR
2004
Springer
179views Music» more  ISMIR 2004»
15 years 5 months ago
Industrial audio fingerprinting distributed system with CORBA and Web Services
With digital technologies, music content providers face serious challenges to protect their rights. Due to the widespread nature of music sources, it is very difficult to central...
Jose Pedro, Vadim Tarasov, Eloi Batlle, Enric Guau...
EUROPKI
2009
Springer
14 years 10 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith
CHIMIT
2007
ACM
15 years 4 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
SOSP
2005
ACM
15 years 9 months ago
Hibernator: helping disk arrays sleep through the winter
Energy consumption has become an important issue in high-end data centers, and disk arrays are one of the largest energy consumers within them. Although several attempts have been...
Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, ...
CCS
2007
ACM
15 years 6 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder