MCA2CM: Multimedia Context-Aware Access Control Model (English)
- New search for: al Bouna, Bechara
- New search for: Chbeir, Richard
- New search for: Miteran, Johel
- New search for: al Bouna, Bechara
- New search for: Chbeir, Richard
- New search for: Miteran, Johel
In:
2007 IEEE Intelligence and Security Informatics
;
115-123
;
2007
-
ISBN:
- Conference paper / Electronic Resource
-
Title:MCA2CM: Multimedia Context-Aware Access Control Model
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2007-05-01
-
Size:4281334 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Sequential Decision Making Algorithms for Port of Entry Inspection: Overcoming Computational ChallengesMadigan, David / Mittal, Sushil / Roberts, Fred et al. | 2007
- 8
-
Using Digital Chains of Custody on Constrained Devices to Verify EvidenceBradford, Phillip G. / Ray, Daniel A. et al. | 2007
- 16
-
Approach for Discovering and Handling Crisis in a Service-Oriented EnvironmentAdam, Nabil / Janeja, Vandana P. / Paliwal, Aabhas V. / Shafiq, Basit / Ulmer, Cedric / Gersabeck, Volker / Hardy, Anne / Bornhoevd, Christof / Schaper, Joachim et al. | 2007
- 25
-
A Quick Group Decision-making Planning Method for Emergency ResponseShen, Huizhang / Zhao, Jidi et al. | 2007
- 32
-
Architecture for an Automatic Customized Warning SystemMontanari, Mirko / Mehrotra, Sharad / Venkatasubramanian, Nalini et al. | 2007
- 40
-
Dynamic Social Network Analysis of a Dark Network: Identifying Significant FacilitatorsKaza, Siddharth / Hu, Daning / Chen, Hsinchun et al. | 2007
- 47
-
A Dynamic Social Network Software Platform for Counter-Terrorism Decision SupportAdler, Richard M. et al. | 2007
- 55
-
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information VisualizationYang, Christopher C. / Ng, Tobun D. et al. | 2007
- 59
-
Deployment of DNIDS in Social NetworksTubi, Meytal / Puzis, Rami / Elovici, Yuval et al. | 2007
- 66
-
A Framework for an Adaptive Intrusion Detection System using Bayesian NetworkJemili, Farah / Zaghdoud, Montaceur / Ahmed, Mohamed Ben et al. | 2007
- 71
-
Classification of Attributes and Behavior in Risk Management Using Bayesian NetworksDantu, Ram / Kolan, Prakash / Akl, Robert / Loper, Kall et al. | 2007
- 75
-
Fine-Grained Reputation-based Routing in Wireless Ad Hoc NetworksYang, Li / Kizza, Joseph M. / Cemerlic, Alma / Liu, Feiqiong et al. | 2007
- 79
-
Organizing Hot-Spot Police Patrol RoutesChawathe, Sudarshan S. et al. | 2007
- 87
-
A Host Architecture for Automobile License Plate RecognitionMitchell, Maury / Hudnall, Matthew / Brown, David / Cordes, David / Smith, Randy / Parrish, Allen et al. | 2007
- 95
-
A Layered Dempster-Shafer Approach to Scenario Construction and AnalysisSanfilippo, Antonio / Baddeley, Bob / Posse, Christian / Whitney, Paul et al. | 2007
- 103
-
Forecasting Terrorist Groups' Warfare: Conventional to CBRNSinai, Joshua et al. | 2007
- 107
-
Host Based Intrusion Detection using Machine LearningMoskovitch, Robert / Pluderman, Shay / Gus, Ido / Stopel, Dima / Feher, Clint / Parmet, Yisrael / Shahar, Yuval / Elovici, Yuval et al. | 2007
- 115
-
MCA2CM: Multimedia Context-Aware Access Control Modelal Bouna, Bechara / Chbeir, Richard / Miteran, Johel et al. | 2007
- 124
-
Surface Transportation and Cyber-Infrastructure: An Exploratory StudyChai, Sangmi / Sharman, Raj / Patil, Smitha / Satam, Shruta / Rao, H.R. / Upadhyaya, Shambhu et al. | 2007
- 129
-
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based EncryptionLi, Liang / Jiang, Wei-Qiang / Tian, Jie / Yang, Yi-Xian / Jiang, Cai-Ping / Wu, Zhe / Yang, Xin et al. | 2007
- 133
-
On-Demand Information Portals for Disaster SituationsMa, Yiming / Kalashnikov, Dmitri V. / Hariharan, Ram / Mehrotra, Sharad / Venkatasubramanian, Nalini / Ashish, Naveen / Lickfett, Jay et al. | 2007
- 137
-
Design and Implementation of a Middleware for Sentient SpacesHore, Bijit / Jafarpour, Hojjat / Jain, Ramesh / Ji, Shengyue / Massaguer, Daniel / Mehrotra, Sharad / Venkatasubramanian, Nalini / Westermann, Utz et al. | 2007
- 145
-
DOTS: Detection of Off-Topic Search via Result ClusteringGoharian, Nazli / Platt, Alana et al. | 2007
- 152
-
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social EngineeringQin, Tiantian / Burgoon, Judee K. et al. | 2007
- 160
-
Categorization of Blogs through Similarity AnalysisChoi, Hwan-Joon / Krishnamoorthy, Mukkai S. et al. | 2007
- 166
-
Security Event Management System based on Mobile Agent TechnologyJingxin, Wang / Zhiying, Wang / Daikui, et al. | 2007
- 172
-
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation PatternsTakemori, Keisuke / Miyake, Yutaka / Ishida, Chie / Sasase, Iwao et al. | 2007
- 180
-
Detection of Port and Network Scan Using Time Independent Feature SetBaig, Habib Ullah / Kamran, Farrukh et al. | 2007
- 185
-
Optimizing Sensor Placement for Intruder Detection with Genetic AlgorithmsBarrett, Samuel R. et al. | 2007
- 189
-
Social Behavior in a Team of Autonomous SensorsSakamoto, Yasuaki / Nickerson, Jeffrey V. et al. | 2007
- 193
-
SIGHTS: A Software System for Finding Coalitions and Leaders in a Social NetworkBaumes, J. / Goldberg, M. / Hayvanovych, M. / Kelley, S. / Magdon-Ismail, M. / Mertsalov, K. / Wallace, W. et al. | 2007
- 200
-
An LDA-based Community Structure Discovery Approach for Large-Scale Social NetworksZhang, Haizheng / Qiu, Baojun / Giles, C. Lee / Foley, Henry C. / Yen, John et al. | 2007
- 208
-
Privacy Preserving Collaborative Data MiningZhan, Justin et al. | 2007
- 209
-
Detecting Anomalies in GraphsSkillicorn, D.B. et al. | 2007
- 217
-
Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix FactorizationWang, Jie / Zhang, Jun et al. | 2007
- 221
-
Fast Fourier Transform Based Data Perturbation Method for Privacy ProtectionXu, Shuting / Lai, Shuhua et al. | 2007
- 225
-
Inferring Meaning and Intent of Discovered Data SourcesBethea, Wayne L. / Cost, R. Scott / Frank, Paul A. / Weiskopf, Frank B. et al. | 2007
- 229
-
The Arizona IDMatcher: A Probabilistic Identity Matching SystemWang, G. Alan / Kaza, Siddharth / Joshi, Shailesh / Chang, Kris / Atabakhsh, Homa / Chen, Hsinchun et al. | 2007
- 236
-
Mining Higher-Order Association Rules from Distributed Named Entity DatabasesLi, Shenzhi / Janneck, Christopher D. / Belapurkar, Aditya P. / Ganiz, Murat / Yang, Xiaoning / Dilsizian, Mark / Wu, Tianhao / Bright, John M. / Pottenger, William M. et al. | 2007
- 244
-
Managing Security Threats and Vulnerabilities for Small to Medium EnterprisesOnwubiko, C. / Lenaghan, A. P. et al. | 2007
- 250
-
A Secure Email System Based on Fingerprint Authentication SchemeWu, Zhe / Tian, Jie / Li, Liang / Jiang, Cai-ping / Yang, Xin et al. | 2007
- 254
-
Geospatial Data Mining for National Security: Land Cover Classification and Semantic GroupingLi, Chuanjun / Khan, Latifur / Thuraisingham, Bhavani / Husain, M. / Chen, Shaofei / Qiu, Fang et al. | 2007
- 262
-
Recursive Algorithm of River and Basin Data Model based on Composite Design PatternKim, Hyung Moo / Yoo, Jae Soo et al. | 2007
- 266
-
Visualization of Events in a Spatially and Multimedia Enriched Virtual EnvironmentDeligiannidis, Leonidas / Hakimpour, Farshad / Sheth, Amit P. et al. | 2007
- 270
-
Making Sense of VAST DataAdams, Summer / Goel, Ashok K. et al. | 2007
- 274
-
Knowledge Reachback for WMD EventsHaynes, Steven R. / Singel, Jonathan A. et al. | 2007
- 282
-
Affect Intensity Analysis of Dark Web ForumsAbbasi, Ahmed / Chen, Hsinchun et al. | 2007
- 289
-
On the Communication Complexity of Privacy-Preserving Information Sharing ProtocolsZhang, Nan et al. | 2007
- 296
-
Semantically Ranked Graph Pattern Queries for Link AnalysisSeid, Dawit / Mehrotra, Sharad et al. | 2007
- 300
-
An Efficient Algorithm for Content Security Filtering Based on Double-ByteZhao, Yanping / Lu, Wei et al. | 2007
- 308
-
FACT: Fast Algorithm for Categorizing TextMengle, Saket S.R. / Goharian, Nazli / Platt, Alana et al. | 2007
- 316
-
Association Rule Mining for Suspicious Email Detection: A Data Mining ApproachAppavu, S. / Rajaram, R. et al. | 2007
- 324
-
Fast Private Association Rule Mining by A Protocol for Securely Sharing Distributed DataEstivill-Castro, Vladimir / HajYasien, Ahmed et al. | 2007
- 331
-
Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern MiningZhan, Justin et al. | 2007
- 335
-
Connecting the Dots: Revealing the Invisible Hand for Sharing InformationSulek, David D. / Howarth, McClain L. / Ruebensaal, Virginia A. et al. | 2007
- 342
-
Interaction Coherence Analysis for Dark Web ForumsFu, Tianjun / Abbasi, Ahmed / Chen, Hsinchun et al. | 2007
- 350
-
A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist OperationsGodfrey, Gregory A. / Cunningham, John / Tran, Tuan et al. | 2007
- 356
-
A Combinatorial Approach to Measuring AnonymityEdman, Matthew / Sivrikaya, Fikret / Yener, Bulent et al. | 2007
- 364
-
An Adaptive Modeling for Security Infrastructure Fault ResponseCui, Zhongjie / Yao, Shuping et al. | 2007
- 365
-
Countering Insider Threats in Personal DevicesBoral, Luk / Disla, Maria / Patil, Shivraj / Williams, Jari / Park, Joon S. et al. | 2007
- 366
-
Dependence Centrality: Identifying Dependence of Nodes in Terrorist NetworksMemon, Nasrullah / Hicks, David L. / Larsen, Henrik Legind et al. | 2007
- 367
-
Distributed Web Police: A Peer-to-Peer Approach to Collaborative Copy DetectionWang, Jenq-Haur / Chang, Hung-Chi et al. | 2007
- 368
-
Emergency Management in Australia, New Zealand and Europe - The 2006 EMANZE SurveyMeissner, Andreas et al. | 2007
- 369
-
Environmental Impact on Underwater Surveillance Systems in Estuary AreasShi, Hongyuan / Kruger, Dov / Nickerson, Jeffrey V. et al. | 2007
- 370
-
Importance of Information Collection and Dissemination for Evacuation Modeling and ManagementYazici, M. Anil / Ozbay, Kaan et al. | 2007
- 371
-
Malicious Code Detection and Acquisition Using Active LearningMoskovitch, Robert / Nissim, Nir / Elovici, Yuval et al. | 2007
- 372
-
Medical Ontology-Enhanced Text Processing for Infectious Disease InformaticsLu, Hsin-Min / Zeng, Daniel / Chen, Hsinchun et al. | 2007
- 373
-
Ontology Based Analysis of Violent EventsWennerberg, P. Oezden / Tanev, H. / Piskorski, J. / Best, C. et al. | 2007
- 374
-
Optimization of Multi-Attribute Tasks for Underwater Motion of Robotic Sensor AgentsGoldman, Irina / Barrett, Samuel / Nickerson, Jeffrey V. et al. | 2007
- 375
-
Periodicity and Application for a kind of n-dimensional Arnold-type TransformationJi-zhi, Wang / Ying-long, Wang / Mei-qin, Wang et al. | 2007
- 376
-
Profiling and Visualizing Cyber-criminal Activities: A General FrameworkChung, Wingyan / Wang, G. Alan et al. | 2007
- 377
-
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless NetworksLei, Ming / Qi, ZiJie / Hong, Xiaoyan / Vrbsky, Susan V. et al. | 2007
- 378
-
Relationally Mapping XML Queries For Scalable XML SearchCathey, Rebecca J. / Beitzel, Steven M. / Jensen, Eric C. / Grossman, David / Frieder, Ophir et al. | 2007
- 379
-
Short Query Sequences in Misuse DetectionPlatt, Alana / Goharian, Nazli et al. | 2007
- 380
-
Simulating Threats Propagation within the NSP InfrastructurePuzis, Rami / Tubi, Meytal / Tahan, Gil / Elovici, Yuval et al. | 2007
- 381
-
Text Extraction of Spatial and Temporal InformationBadia, Antonio / Ravishankar, Jothi / Muezzinoglu, Tulay et al. | 2007
- 383
-
Author index| 2007
- i
-
Covers| 2007
- ii
-
Breaker Pages| 2007
- iii
-
Commentary| 2007
- ix
-
Society Related Material| 2007
- v
-
Contributor Listings| 2007
- xiii
-
Table of Contents| 2007