Sciweavers

1757 search results - page 192 / 352
» Secure Content Validation
Sort
View
DIMVA
2011
14 years 6 months ago
An Assessment of Overt Malicious Activity Manifest in Residential Networks
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth s...
Gregor Maier, Anja Feldmann, Vern Paxson, Robin So...
INFOCOM
2012
IEEE
13 years 5 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
133
Voted
ODRL
2004
15 years 4 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
JTAER
2008
82views more  JTAER 2008»
15 years 3 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
KDD
2002
ACM
110views Data Mining» more  KDD 2002»
16 years 3 months ago
A model for discovering customer value for E-content
There exists a huge demand for multimedia goods and services in the Internet. Currently available bandwidth speeds can support sale of downloadable content like CDs, e-books, etc....
Srinivasan Jagannathan, Jayanth Nayak, Kevin C. Al...