A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
An access control model for video database systems
Proceedings of the ninth international conference on Information and knowledge management
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
The effects of filtered video on awareness and privacy
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Wizard: A Database Inference Analysis and Detection System
IEEE Transactions on Knowledge and Data Engineering
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Machine Learning
An Information-Theoretic Definition of Similarity
ICML '98 Proceedings of the Fifteenth International Conference on Machine Learning
Ma X: An Access Control System for Digital Libraries and the Web
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Logic, Knowledge Representation, and Bayesian Decision Theory
CL '00 Proceedings of the First International Conference on Computational Logic
A hierarchical access control model for video database systems
ACM Transactions on Information Systems (TOIS)
Data Level Inference Detection in Database Systems
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
A novel approach for privacy-preserving video sharing
Proceedings of the 14th ACM international conference on Information and knowledge management
Secure XML publishing without information leakage in the presence of data inference
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Protection of Database Security via Collaborative Inference Detection
IEEE Transactions on Knowledge and Data Engineering
Views, authorization, and locking in a relational data base system
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
Privacy preserving via tree augmented naïve Bayesian classifier in multimedia database
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect access a difficult task. In this paper, we propose a novel approach to detect possible inference channels established between multimedia objects representing persons by combining social network information with unmasked content of multimedia objects. Here, we present the techniques used to map the content of social networks to the set of multimedia objects at hand. We also provide an MiD function able to determine whether an unmasked multimedia object combined with data from the social network infers a sensitive multimedia object.