Academic literature on the topic 'CONTENT ACCESS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CONTENT ACCESS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "CONTENT ACCESS"
Moffett, Jonathan D., and Morris S. Sloman. "Content-dependent access control." ACM SIGOPS Operating Systems Review 25, no. 2 (April 1991): 63–70. http://dx.doi.org/10.1145/122120.122125.
Full textJalil Piran, Md, S. M. Riazul Islam, and Doug Young Suh. "CASH: Content- and Network-Context-Aware Streaming Over 5G HetNets." IEEE Access 6 (2018): 46167–78. http://dx.doi.org/10.1109/access.2018.2864790.
Full textFan, Yuqi, Bing Yang, Donghui Hu, Xiaohui Yuan, and Xiong Xu. "Social- and Content-Aware Prediction for Video Content Delivery." IEEE Access 8 (2020): 29219–27. http://dx.doi.org/10.1109/access.2020.2972920.
Full textKim, Guhyun, Vladimir Kornijcuk, Jeeson Kim, Dohun Kim, Cheol Seong Hwang, and Doo Seok Jeong. "Combination-Encoding Content-Addressable Memory With High Content Density." IEEE Access 7 (2019): 137620–28. http://dx.doi.org/10.1109/access.2019.2942150.
Full textLi, Chengming, Shimin Gong, Xiaojie Wang, Lei Wang, Qingshan Jiang, and Koji Okamura. "Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric Networking." IEEE Access 6 (2018): 5727–39. http://dx.doi.org/10.1109/access.2017.2778502.
Full textRyu, Seung-Kwan, Chang-Hee Park, and Jong-Bae Hong. "Content Analysis of Public Access Programs." Journal of the Korea Contents Association 12, no. 1 (January 28, 2012): 146–53. http://dx.doi.org/10.5392/jkca.2012.12.01.146.
Full textGeißler, Stefan. "New methods to access scientific content." Information Services & Use 28, no. 2 (October 2, 2008): 141–46. http://dx.doi.org/10.3233/isu-2008-0563.
Full textSchewe, Klaus Dieter, N. A. Kinshuk, and Tiong Goh. "Content adaptivity in wireless web access." International Journal of Mobile Communications 2, no. 3 (2004): 260. http://dx.doi.org/10.1504/ijmc.2004.005164.
Full textDesai, Rutvik H. "Access and content of abstract concepts." Physics of Life Reviews 29 (July 2019): 166–68. http://dx.doi.org/10.1016/j.plrev.2019.03.010.
Full textKoumpis, K., and S. Renals. "Content-based access to spoken audio." IEEE Signal Processing Magazine 22, no. 5 (September 2005): 61–69. http://dx.doi.org/10.1109/msp.2005.1511824.
Full textDissertations / Theses on the topic "CONTENT ACCESS"
Helberger, Natali. "Controlling access to content regulating conditional access in digital broadcasting /." [S.l. : Amsterdam : s.n.] ; Universiteit van Amsterdam [Host], 2005. http://dare.uva.nl/document/78324.
Full textWeiss, Ron 1970. "Content-based access to algebraic video." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/12044.
Full textFu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.
Full textVita.
Includes bibliographical references (p. 129-142).
A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.
(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.
by Kevin E. Fu.
Ph.D.
Ragab, Hassen Hani. "Key management for content access control in hierarchical environments." Compiègne, 2007. http://www.theses.fr/2007COMP1718.
Full textLots of applications, ranging from interactive online games to business corporations and government departments, and from multi-layered data streaming to databases access control, require ensuring that its users respect some access control restrictions. Content access control in hierarchies (CACH) consists in ensuring, using cryptographic techniques, that the users access application resources to which they are entitled. Content access control is generally ensured by encrypting the system resources and giving the keys to users having access to them. Generating and managing those keys is a crucial requirement for the deployment of content access control systems. Moreover, large scale hierarchies with highly dynamic users present serious scalability issues for key management. In this thesis, we deal with key management for content access control. We start by defining building blocks of key management for CACH. Then, we study the existing key management solutions and classify them into two categories -namely, the dependent keys and independent keys approaches - and propose a key management framework for each category. We further propose a generic model to represent independent-keys key management schemes and use this model to define lower bounds on the key management overhead. Then, we propose a new independent-keys key management scheme and prove that it is optimal by showing that it reaches the overhead lower bounds. The optimality of this scheme constitutes one of the most important results of our thesis. Thereafter, we propose new efficient dependent-keys key management schemes and evaluate them by simulations and Markov process modelling. At last, we propose a variant of our schemes allowing to define trade-offs on the performance criteria. We show that this variant offers a means to define very interesting overhead trade-offs
He, Kun. "Content privacy and access control in image-sharing platforms." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Full textIn recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Gopal, Burra 1968. "Integrating content-based access mechanisms with hierarchical file systems." Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282291.
Full textPohl, Roland. "Qucosa: Quality Content of Saxony." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-32992.
Full textHermansson, Rickard, and Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents." Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.
Full textAtt enkelt dela dokument med arbetskollegor är något alla företag har ett behov utav.Ofta är dessa dokument interna och skall hållas inom företaget. Även inom företagetkan det finnas behov av att styra vem som har rätt att läsa ellerrevidera dokumenten.Denna examensarbetesrapport beskriver olika tekniker ochmodeller för accesskon-troll, versionshantering och distribution som kan användas för att implementera ettsystem som kan lösa de nämnda problemen.Ett av kraven för systemet var ett användargränssnitt där användare kan ladda upp ochned sina dokument. Ytterligare krav var att systemet skulleversionshantera dokumenetenoch att användare skall kunna komma åt de olika versionerna.Systemet skulle ocksåkunna hantera åtkomstkontroll på dokumentnivå, något denna examensrapport definerarsom "fine grained access control".För att designa ett sådant system så utredes och utvärderades olika tekniker kringåtkomstkontroll och versionshantering samt distributionav dokumenten. För att testasystemet så utvecklads en prototyp baserad på de valda lösningsmetoderna.Den resulterande prototypen uppfyllde de mål som Nordicstation satte för projektet,dock endast med grundläggande funktionalitet. Stöd för atthämta olika versioner avdokument, kontrollera access till dokumentet nere på dokument nivå och ett webbaseratgränssnitt för att administrera dokumenten.
Sambra-Petre, Raluca-Diana. "2D/3D knowledge inference for intelligent access to enriched visual content." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917972.
Full textKnox, Ian. "Web based regional newspapers : The role of content : A thesis." Thesis, University of Ballarat, 2002. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/43155.
Full textMaster of Business
Books on the topic "CONTENT ACCESS"
Perry, Brad, John Dinsmore, Shi-Kuo Chang, David Doermann, Azriel Rosenfeld, and Scott Stevens. Content-Based Access to Multimedia Information. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5035-8.
Full textHelberger, Natali. Controlling access to content: Regulating conditional access in digital broadcasting. The Hague: Kluwer Law International, 2005.
Find full textPiotr, Wasilewski. Open content: Zagadnienia prawne. Warszawa: Oficyna Wolters Kluwer Polska, 2008.
Find full textLiang, Lawrence. Guide to open content licenses v1.2. Rotterdam: Piet Zwart Institute, Institute for Postgraduate Studies and Research, Willem de Kooning Academy, 2005.
Find full textRasmussen, Kristi. The Gates public access content server: An easy guide. Seattle: Bill & Melinda Gates Foundation, 2002.
Find full textEuropean Commission. Information Society DG., ed. Access to capital for the content industries: Executive summary. Luxembourg: European Commission, Directorate-General for the Information Society, 2000.
Find full textH, Lee Sul, ed. Improved access to information: Portals, content selection, and digital information. Binghamton, NY: Haworth Information Press, 2003.
Find full textCenter, Electronic Privacy Information, ed. Filters and freedom: Free speech perspective on Internet content controls. Washington, DC: The Center, 1999.
Find full textA, Parham Iris, Poon Leonard W. 1942-, and Siegler Ilene C, eds. ACCESS: Aging curriculum content for education in the social-behavioral sciences. New York: Springer Pub. Co., 1990.
Find full textCenter, Electronic Privacy Information, ed. Filters and freedom 2.0: Free speech perspective on Internet content controls. 2nd ed. Washington, DC: The Center, 2001.
Find full textBook chapters on the topic "CONTENT ACCESS"
Thomas, Jim, and Alan Turner. "Access and Retrieval of Digital Content." In Digital Content Creation, 1–8. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0293-9_1.
Full textFaloutsos, Christos. "Primary Key Access Methods." In Searching Multimedia Databases by Content, 11–17. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_3.
Full textFaloutsos, Christos. "Secondary Key Access Methods." In Searching Multimedia Databases by Content, 19–24. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_4.
Full textFaloutsos, Christos. "Spatial Access Methods (SAMS)." In Searching Multimedia Databases by Content, 25–39. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_5.
Full textFaloutsos, Christos. "Access Methods For Text." In Searching Multimedia Databases by Content, 41–54. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_6.
Full textLawless, Séamus, Owen Conlan, and Cormac Hampson. "Tailoring Access to Content." In A New Companion to Digital Humanities, 171–84. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118680605.ch12.
Full textGiven, No Author. "Towards Semantic Universal Multimedia Access." In Visual Content Processing and Representation, 13–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39798-4_3.
Full textKőrösi, Attila, Balázs Székely, and Miklós Máté. "Modeling the Content Popularity Evolution in Video-on-Demand Systems." In Access Networks, 47–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20931-4_4.
Full textBorsetti, Diego, Claudio Casetti, Carla-Fabiana Chiasserini, and Luigi Liquori. "Content Discovery in Heterogeneous Mobile Networks." In Heterogeneous Wireless Access Networks, 1–20. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09777-0_15.
Full textJiménez, Tania, Yezekael Hayel, and Eitan Altman. "Competition in Access to Content." In NETWORKING 2012, 211–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30054-7_17.
Full textConference papers on the topic "CONTENT ACCESS"
Mohrehkesh, Shahram, Tamer Nadeem, and Michele C. Weigle. "Context-aware content adaptation in access point." In the 2012 ACM Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2370216.2370384.
Full textKalman, Gyorgy, and Josef Noll. "User controlled content access." In 2008 3rd International Symposium on Wireless Pervasive Computing (ISWPC). IEEE, 2008. http://dx.doi.org/10.1109/iswpc.2008.4556193.
Full textOluwatimi, Oyindamola, Daniele Midi, and Elisa Bertino. "A Context-Aware System to Secure Enterprise Content." In SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2914642.2914648.
Full textKim, Younghyun, Haneul Ko, and Sangheon Pack. "Reducing contents access latency in mobile content oriented networks." In 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983138.
Full textZeng, Wenrong, Yuhao Yang, and Bo Luo. "Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases." In 2014 IEEE International Conference on Big Data (Big Data). IEEE, 2014. http://dx.doi.org/10.1109/bigdata.2014.7004294.
Full textSteiner, Moritz, Damiano Carra, and Ernst W. Biersack. "Faster Content Access in KAD." In 2008 Eighth International Conference on Peer-to-Peer Computing (P2P). IEEE, 2008. http://dx.doi.org/10.1109/p2p.2008.28.
Full textHasan, Kamrul, Chanhong Park, Minsub Lee, and Seong-Ho Jeong. "A cluster-based content access mechanism for Content-Centric Networking." In 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983206.
Full textWeiss, Duda, and Gifford. "Content-based access to algebraic video." In Proceedings of IEEE International Conference on Multimedia Computing and Systems MMCS-94. IEEE Comput. Soc. Press, 1994. http://dx.doi.org/10.1109/mmcs.1994.292446.
Full textTeixeira, Dario, and Yassine Faihe. "In-home access to multimedia content." In the tenth ACM international conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/641007.641016.
Full textGunsel, B., S. Sariel, and O. Icoglu. "Content-based access to art paintings." In rnational Conference on Image Processing. IEEE, 2005. http://dx.doi.org/10.1109/icip.2005.1530116.
Full textReports on the topic "CONTENT ACCESS"
Pratt, C., D. Thakore, and B. Stark. HTTP Random Access and Live Content. RFC Editor, November 2019. http://dx.doi.org/10.17487/rfc8673.
Full textLevinson, E. Message/External-Body Content-ID Access Type. RFC Editor, December 1995. http://dx.doi.org/10.17487/rfc1873.
Full textZeilenga, K., and J. H. Choi. The Lightweight Directory Access Protocol (LDAP) Content Synchronization Operation. RFC Editor, June 2006. http://dx.doi.org/10.17487/rfc4533.
Full textLi, Bing, Zhijie Wang, Dijiang Huang, and Yan Zhu. Toward Privacy-preserving Content Access Control for Information Centric Networking. Fort Belvoir, VA: Defense Technical Information Center, March 2014. http://dx.doi.org/10.21236/ada606547.
Full textKlosek, Katherine. Copyright and Contracts: Issues and Strategies. Association of Research Libraries, July 2022. http://dx.doi.org/10.29242/report.copyrightandcontracts2022.
Full textMintii, I. S. Using Learning Content Management System Moodle in Kryvyi Rih State Pedagogical University educational process. [б. в.], July 2020. http://dx.doi.org/10.31812/123456789/3866.
Full textGroeneveld, Caspar, Elia Kibga, and Tom Kaye. Deploying an e-Learning Environment in Zanzibar: Feasibility Assessment. EdTech Hub, July 2020. http://dx.doi.org/10.53832/edtechhub.0028.
Full textChoquette, Gary. PR-000-23COMP-R04 Aboveground Tank Corrosion Comprehensive Compendium. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), May 2023. http://dx.doi.org/10.55274/r0000019.
Full textMelnyk, Yuriy. Academic Journal Website Model. KRPOCH, 2018. http://dx.doi.org/10.26697/preprint.melnyk.1.2018.
Full textChoquette, Gary. PR-000-23COMP-R05 Pipe Wrinkles Comprehensive Compendia. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), May 2023. http://dx.doi.org/10.55274/r0000020.
Full text