Role-Based Access Control Models
Computer
New surveillance techniques raise privacy concerns
Communications of the ACM
A hierarchical access control model for video database systems
ACM Transactions on Information Systems (TOIS)
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
A Logical Approach to Quality of Service Specification in Video Databases
Multimedia Tools and Applications
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
Enabling Video Privacy through Computer Vision
IEEE Security and Privacy
A novel approach for privacy-preserving video sharing
Proceedings of the 14th ACM international conference on Information and knowledge management
A framework for a video analysis tool for suspicious event detection
MDM '05 Proceedings of the 6th international workshop on Multimedia data mining: mining integrated media and complex data
Automatic image segmentation by integrating color-edge extraction and seeded region growing
IEEE Transactions on Image Processing
Adaptive transformation for robust privacy protection in video surveillance
Advances in Multimedia
Threat-based evaluation for context-aware multimedia surveillance system
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Multimedia Tools and Applications
Hi-index | 0.01 |
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discussed an access control model and accedes control algorithms for confidentiality. Finally we discuss privacy preserving video surveillance. Our goal is build a comprehensive system that can detect suspicious events, ensure confidentiality as well as privacy.