• No results found

[PDF] Top 20 Scalable access control for privacy-aware media sharing

Has 10000 "Scalable access control for privacy-aware media sharing" found on our website. Below are the top 20 most common "Scalable access control for privacy-aware media sharing".

Scalable access control for privacy-aware media sharing

Scalable access control for privacy-aware media sharing

... different media content with anybody from ...forward access of user -generated media content additionally brings concerning privacy ...Traditional access management mechanisms, wherever ... See full document

8

Cloud Assisted Content Sharing Networks on Attribute Based Access to Scalable Media
Mahjabeen & V Mallesi

Cloud Assisted Content Sharing Networks on Attribute Based Access to Scalable Media Mahjabeen & V Mallesi

... underlying access control ...an access control policy, or access policy for short, associated with user ...the access policy in the ...grant access to an unknown set of ... See full document

6

Attribute Based Access to Scalable Media

Attribute Based Access to Scalable Media

... fine-grained access control policies and dynamic cluster membership by victimization CP-ABE ...fine-grained access management supported ABE they are KP-ABE and ...the access policy is involved ... See full document

7

My Privacy My Authorization: Control of Photograph
Sharing in Online Social Media

My Privacy My Authorization: Control of Photograph Sharing in Online Social Media

... protection and security issues. In this study authors tend to overview a stratified example of the individuals from the Facebook (an informal community for schools and secondary schools) at a USA instructional exercise ... See full document

8

Scalable Media in Cloud Assisted Content Sharing Network Based on Attribute Access
Fahad Ayad Khaleel

Scalable Media in Cloud Assisted Content Sharing Network Based on Attribute Access Fahad Ayad Khaleel

... Cloud solutions have new security implications for con- sideration. Organizations in different industries have divergent requirements regarding privacy and data retention. This means that the solution selected by ... See full document

5

Online Social Network - A Threat to Privacy and Security of Human Society

Online Social Network - A Threat to Privacy and Security of Human Society

... even aware of the risks when they share something ...about sharing something is “made on the moment”, however in todays networked world, the next day the content you have shared is accessible to parents, ... See full document

6

Privacy public cloud auditing by using KAC for scalable data sharing

Privacy public cloud auditing by using KAC for scalable data sharing

... Grained Access Control of Encrypted Data” [2], presented a technique Key-Policy Attribute Based Encryption ...with access structures that control with ciphertexts a user is able to ... See full document

6

Privacy Access for MongoDB

Privacy Access for MongoDB

... of privacy-aware access control into NoSQL data stores a very important ...for access purposes for which they have a proper ...information sharing and ... See full document

6

Privacy-Aware Risk-Based Access Control Systems

Privacy-Aware Risk-Based Access Control Systems

... getting access to a given dataset, none of them in isolation seems appropriate to measure the general privacy violation the risk incurred by an organization when processing sensitive ...data sharing ... See full document

192

Recommending access control decisions to social media users

Recommending access control decisions to social media users

... social media profiles of the users as was discussed in Chapter ...social media profiles can often be vast and can depend on the particular social media ...Social media sites such as Facebook, ... See full document

148

Access control management and privacy-preserving

Access control management and privacy-preserving

... data privacy is guaranteed by ensuring that non-key attributes that leak information are suppressed or general- ized so that, for every record in the modified table, there are at least (k − 1) other records that ... See full document

166

Privacy Aware Interest Sharing & Matching Protocol in Mobile Social Network

Privacy Aware Interest Sharing & Matching Protocol in Mobile Social Network

... etc.).However, privacy concerns often hinder users from enabling this ...location Privacy. Based on this, we propose our Privacy Aware Interest Sharing & Matching Protocol, which ... See full document

6

Access control management and privacy-preserving

Access control management and privacy-preserving

... are privacy-preserving. Thus the field of privacy has seen rapid advances in recent years and in the data mining environment have led to increased concerns about ...the privacy-preserving data mining ... See full document

15

ACM Access control using k-anonymity, query evaluate on outsourced database

ACM Access control using k-anonymity, query evaluate on outsourced database

... In TDSM, the divisions are divide by the median value. Consider a division that inter sections a query. If the median withal comes down deep down the query then even after devidingye partition, ye imprecision for that ... See full document

8

Ubiquitous Security for Ubiquitous Computing

Ubiquitous Security for Ubiquitous Computing

... information sharing? This paper describes research conducted into answering these ...context-based access control mechanisms and pro-active threat assessment ... See full document

8

Recommending privacy preferences in location sharing services

Recommending privacy preferences in location sharing services

... We design our decentralised location-privacy recommender system based on two assumptions. First, in the scenario of LSS, users often move around with their mobile devices (e.g., smart- phones) and often encounter ... See full document

148

Scalable and Media Aware Adaptive Video Streaming over Wireless Networks

Scalable and Media Aware Adaptive Video Streaming over Wireless Networks

... Table 1 presents simulation results obtained by configuring each channel with a BLER of 10.8% (BER = 9.3e − 3). For “Paris” and “mother and daughter” sequences, the bitrate provided at RLC layer is 64 Kbps and then by ... See full document

11

Privacy Access Policy for Mongo DB

Privacy Access Policy for Mongo DB

... several privacy-aware access control models proposed for relational DBMSs to identify the characteristics of privacy policies to be ...[2] privacy policies require rule based and ... See full document

5

BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for IoT

BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for IoT

... of privacy and security. Access control (AC) is among the top security concerns, which is critical in resource and information protection over IoT ...Traditional access control ... See full document

22

Privacy aware monitoring for moving objects

Privacy aware monitoring for moving objects

... and privacy are two fundamental issues in moving object ...a privacy-aware monitoring (PAM) framework that addresses both ...and privacy, in particular when and how mobile clients should send ... See full document

9

Show all 10000 documents...