Sciweavers

374 search results - page 4 / 75
» Rights Protection for Relational Data
Sort
View
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 7 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
DRM
2003
Springer
14 years 20 days ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
ICMCS
1998
IEEE
82views Multimedia» more  ICMCS 1998»
13 years 11 months ago
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
Various digital watermarking techniques have been proposed in recent years as the methods to protect the copyright of multimedia data. However, as pointed out by the IBM research ...
Lintian Qiao, Klara Nahrstedt
EOR
2006
82views more  EOR 2006»
13 years 7 months ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford
EATIS
2007
ACM
13 years 11 months ago
Protection of technological measures: juridical definition of a technical tool
The present work aims to bring to discussion and to analysis, the texts of the 6th article of the 2001/29/EC Directive (22nd of May) and the 217th article of the Portuguese law 50...
Lígia Lopes de Sousa Carreto