Towards a Network-Independent Policy Specification

Author(s):  
Cataldo Basile ◽  
Antonio Lioy ◽  
Marco Vallini
Keyword(s):  
2010 ◽  
Author(s):  
Henry DeYoung ◽  
Deepak Garg ◽  
Limin Jia ◽  
Dilsun Kaynar ◽  
Anupam Datta

2005 ◽  
Vol 8 (4) ◽  
pp. 351-387 ◽  
Author(s):  
Xinwen Zhang ◽  
Francesco Parisi-Presicce ◽  
Ravi Sandhu ◽  
Jaehong Park

1998 ◽  
Author(s):  
C. Alaettinoglu ◽  
T. Bates ◽  
E. Gerich ◽  
D. Karrenberg ◽  
D. Meyer ◽  
...  

Author(s):  
Nicodemos Damianou ◽  
Naranker Dulay ◽  
Emil Lupu ◽  
Morris Sloman

Author(s):  
Bechara Al Bouna ◽  
Richard Chbeir

Cyber terrorism is one of the emergent issues to handle in the domain of security and access control models. Cyber Terrorist attacks on information systems are growing further and becoming significantly effective. Multimedia object retrieval systems are considered one of many targets tolerable for such attacks due to the fact that they are being increasingly used in governmental departments. For these reasons, the need for an access control system is considered an unavoidable matter to be taken at a high priority. Several textual-oriented authorization models have been provided in the literature. However, multimedia objects are more complex in structure and content than textual ones, and thus require models to provide full multimedia-oriented components specification. In this paper, we point out some of the related work addressing multimedia objects authorization and access control models where objects such as documents, images, videos, sounds, etc., are being protected from unauthorized access. We describe also our model defined to handle multimedia content access control and security breaches that might occur due to users’ relations.


Sign in / Sign up

Export Citation Format

Share Document