A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Approximate Nearest Neighbor Searching in Multimedia Databases
Proceedings of the 17th International Conference on Data Engineering
Query Processing Issues in Image(Multimedia) Databases
ICDE '99 Proceedings of the 15th International Conference on Data Engineering
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
Access-Control Language for Multidomain Environments
IEEE Internet Computing
Towards privacy-enhanced authorization policies and languages
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
Security in collaborative multimedia art communities
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
de-linkability: a privacy-preserving constraint for safely outsourcing multimedia documents
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
Access control models are becoming increasingly important in several application domains especially in distributed environments like those addressed by Web Services. Established approaches such as DAC [16] , MAC [16] RBAC [11, 12, 22] and others [6, 5, 15, 1] suggest representing users in different ways (labels, roles, credentials, etc.) in order to facilitate the association of authorization and access control policies. In intelligent and virtual ambient applications, users exist in a controlled environment equipped with multimedia sensors such as cameras and microphones, and use their terminals in several application environments. In this paper, we study the problem of integrating multimedia objects into access control models and particularly role-based ones. Here, we describe a Multimedia Access Control Language (M 2ACL) in which users and roles are described by using sets of mul- timedia objects,greatly increasing the flexibility of access control policies and their applicability to virtual and ambient intelligence (AmI environments.We address potential risks related to the use of multimedia objects by defining the concept of filter functions used to aggregate a set of values into a relevant one.Finally,we present a set of functional specification and the experiments conducted to validate the proposed approach.