Literatura académica sobre el tema "CONTENT ACCESS"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "CONTENT ACCESS".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "CONTENT ACCESS"
Moffett, Jonathan D. y Morris S. Sloman. "Content-dependent access control". ACM SIGOPS Operating Systems Review 25, n.º 2 (abril de 1991): 63–70. http://dx.doi.org/10.1145/122120.122125.
Texto completoJalil Piran, Md, S. M. Riazul Islam y Doug Young Suh. "CASH: Content- and Network-Context-Aware Streaming Over 5G HetNets". IEEE Access 6 (2018): 46167–78. http://dx.doi.org/10.1109/access.2018.2864790.
Texto completoFan, Yuqi, Bing Yang, Donghui Hu, Xiaohui Yuan y Xiong Xu. "Social- and Content-Aware Prediction for Video Content Delivery". IEEE Access 8 (2020): 29219–27. http://dx.doi.org/10.1109/access.2020.2972920.
Texto completoKim, Guhyun, Vladimir Kornijcuk, Jeeson Kim, Dohun Kim, Cheol Seong Hwang y Doo Seok Jeong. "Combination-Encoding Content-Addressable Memory With High Content Density". IEEE Access 7 (2019): 137620–28. http://dx.doi.org/10.1109/access.2019.2942150.
Texto completoLi, Chengming, Shimin Gong, Xiaojie Wang, Lei Wang, Qingshan Jiang y Koji Okamura. "Secure and Efficient Content Distribution in Crowdsourced Vehicular Content-Centric Networking". IEEE Access 6 (2018): 5727–39. http://dx.doi.org/10.1109/access.2017.2778502.
Texto completoRyu, Seung-Kwan, Chang-Hee Park y Jong-Bae Hong. "Content Analysis of Public Access Programs". Journal of the Korea Contents Association 12, n.º 1 (28 de enero de 2012): 146–53. http://dx.doi.org/10.5392/jkca.2012.12.01.146.
Texto completoGeißler, Stefan. "New methods to access scientific content". Information Services & Use 28, n.º 2 (2 de octubre de 2008): 141–46. http://dx.doi.org/10.3233/isu-2008-0563.
Texto completoSchewe, Klaus Dieter, N. A. Kinshuk y Tiong Goh. "Content adaptivity in wireless web access". International Journal of Mobile Communications 2, n.º 3 (2004): 260. http://dx.doi.org/10.1504/ijmc.2004.005164.
Texto completoDesai, Rutvik H. "Access and content of abstract concepts". Physics of Life Reviews 29 (julio de 2019): 166–68. http://dx.doi.org/10.1016/j.plrev.2019.03.010.
Texto completoKoumpis, K. y S. Renals. "Content-based access to spoken audio". IEEE Signal Processing Magazine 22, n.º 5 (septiembre de 2005): 61–69. http://dx.doi.org/10.1109/msp.2005.1511824.
Texto completoTesis sobre el tema "CONTENT ACCESS"
Helberger, Natali. "Controlling access to content regulating conditional access in digital broadcasting /". [S.l. : Amsterdam : s.n.] ; Universiteit van Amsterdam [Host], 2005. http://dare.uva.nl/document/78324.
Texto completoWeiss, Ron 1970. "Content-based access to algebraic video". Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/12044.
Texto completoFu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.
Texto completoVita.
Includes bibliographical references (p. 129-142).
A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.
(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.
by Kevin E. Fu.
Ph.D.
Ragab, Hassen Hani. "Key management for content access control in hierarchical environments". Compiègne, 2007. http://www.theses.fr/2007COMP1718.
Texto completoLots of applications, ranging from interactive online games to business corporations and government departments, and from multi-layered data streaming to databases access control, require ensuring that its users respect some access control restrictions. Content access control in hierarchies (CACH) consists in ensuring, using cryptographic techniques, that the users access application resources to which they are entitled. Content access control is generally ensured by encrypting the system resources and giving the keys to users having access to them. Generating and managing those keys is a crucial requirement for the deployment of content access control systems. Moreover, large scale hierarchies with highly dynamic users present serious scalability issues for key management. In this thesis, we deal with key management for content access control. We start by defining building blocks of key management for CACH. Then, we study the existing key management solutions and classify them into two categories -namely, the dependent keys and independent keys approaches - and propose a key management framework for each category. We further propose a generic model to represent independent-keys key management schemes and use this model to define lower bounds on the key management overhead. Then, we propose a new independent-keys key management scheme and prove that it is optimal by showing that it reaches the overhead lower bounds. The optimality of this scheme constitutes one of the most important results of our thesis. Thereafter, we propose new efficient dependent-keys key management schemes and evaluate them by simulations and Markov process modelling. At last, we propose a variant of our schemes allowing to define trade-offs on the performance criteria. We show that this variant offers a means to define very interesting overhead trade-offs
He, Kun. "Content privacy and access control in image-sharing platforms". Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Texto completoIn recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Gopal, Burra 1968. "Integrating content-based access mechanisms with hierarchical file systems". Diss., The University of Arizona, 1997. http://hdl.handle.net/10150/282291.
Texto completoPohl, Roland. "Qucosa: Quality Content of Saxony". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-32992.
Texto completoHermansson, Rickard y Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents". Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.
Texto completoAtt enkelt dela dokument med arbetskollegor är något alla företag har ett behov utav.Ofta är dessa dokument interna och skall hållas inom företaget. Även inom företagetkan det finnas behov av att styra vem som har rätt att läsa ellerrevidera dokumenten.Denna examensarbetesrapport beskriver olika tekniker ochmodeller för accesskon-troll, versionshantering och distribution som kan användas för att implementera ettsystem som kan lösa de nämnda problemen.Ett av kraven för systemet var ett användargränssnitt där användare kan ladda upp ochned sina dokument. Ytterligare krav var att systemet skulleversionshantera dokumenetenoch att användare skall kunna komma åt de olika versionerna.Systemet skulle ocksåkunna hantera åtkomstkontroll på dokumentnivå, något denna examensrapport definerarsom "fine grained access control".För att designa ett sådant system så utredes och utvärderades olika tekniker kringåtkomstkontroll och versionshantering samt distributionav dokumenten. För att testasystemet så utvecklads en prototyp baserad på de valda lösningsmetoderna.Den resulterande prototypen uppfyllde de mål som Nordicstation satte för projektet,dock endast med grundläggande funktionalitet. Stöd för atthämta olika versioner avdokument, kontrollera access till dokumentet nere på dokument nivå och ett webbaseratgränssnitt för att administrera dokumenten.
Sambra-Petre, Raluca-Diana. "2D/3D knowledge inference for intelligent access to enriched visual content". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917972.
Texto completoKnox, Ian. "Web based regional newspapers : The role of content : A thesis". Thesis, University of Ballarat, 2002. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/43155.
Texto completoMaster of Business
Libros sobre el tema "CONTENT ACCESS"
Perry, Brad, John Dinsmore, Shi-Kuo Chang, David Doermann, Azriel Rosenfeld y Scott Stevens. Content-Based Access to Multimedia Information. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-5035-8.
Texto completoHelberger, Natali. Controlling access to content: Regulating conditional access in digital broadcasting. The Hague: Kluwer Law International, 2005.
Buscar texto completoPiotr, Wasilewski. Open content: Zagadnienia prawne. Warszawa: Oficyna Wolters Kluwer Polska, 2008.
Buscar texto completoLiang, Lawrence. Guide to open content licenses v1.2. Rotterdam: Piet Zwart Institute, Institute for Postgraduate Studies and Research, Willem de Kooning Academy, 2005.
Buscar texto completoRasmussen, Kristi. The Gates public access content server: An easy guide. Seattle: Bill & Melinda Gates Foundation, 2002.
Buscar texto completoEuropean Commission. Information Society DG., ed. Access to capital for the content industries: Executive summary. Luxembourg: European Commission, Directorate-General for the Information Society, 2000.
Buscar texto completoH, Lee Sul, ed. Improved access to information: Portals, content selection, and digital information. Binghamton, NY: Haworth Information Press, 2003.
Buscar texto completoCenter, Electronic Privacy Information, ed. Filters and freedom: Free speech perspective on Internet content controls. Washington, DC: The Center, 1999.
Buscar texto completoA, Parham Iris, Poon Leonard W. 1942- y Siegler Ilene C, eds. ACCESS: Aging curriculum content for education in the social-behavioral sciences. New York: Springer Pub. Co., 1990.
Buscar texto completoCenter, Electronic Privacy Information, ed. Filters and freedom 2.0: Free speech perspective on Internet content controls. 2a ed. Washington, DC: The Center, 2001.
Buscar texto completoCapítulos de libros sobre el tema "CONTENT ACCESS"
Thomas, Jim y Alan Turner. "Access and Retrieval of Digital Content". En Digital Content Creation, 1–8. London: Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0293-9_1.
Texto completoFaloutsos, Christos. "Primary Key Access Methods". En Searching Multimedia Databases by Content, 11–17. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_3.
Texto completoFaloutsos, Christos. "Secondary Key Access Methods". En Searching Multimedia Databases by Content, 19–24. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_4.
Texto completoFaloutsos, Christos. "Spatial Access Methods (SAMS)". En Searching Multimedia Databases by Content, 25–39. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_5.
Texto completoFaloutsos, Christos. "Access Methods For Text". En Searching Multimedia Databases by Content, 41–54. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-1-4613-1445-5_6.
Texto completoLawless, Séamus, Owen Conlan y Cormac Hampson. "Tailoring Access to Content". En A New Companion to Digital Humanities, 171–84. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118680605.ch12.
Texto completoGiven, No Author. "Towards Semantic Universal Multimedia Access". En Visual Content Processing and Representation, 13–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39798-4_3.
Texto completoKőrösi, Attila, Balázs Székely y Miklós Máté. "Modeling the Content Popularity Evolution in Video-on-Demand Systems". En Access Networks, 47–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20931-4_4.
Texto completoBorsetti, Diego, Claudio Casetti, Carla-Fabiana Chiasserini y Luigi Liquori. "Content Discovery in Heterogeneous Mobile Networks". En Heterogeneous Wireless Access Networks, 1–20. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-09777-0_15.
Texto completoJiménez, Tania, Yezekael Hayel y Eitan Altman. "Competition in Access to Content". En NETWORKING 2012, 211–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30054-7_17.
Texto completoActas de conferencias sobre el tema "CONTENT ACCESS"
Mohrehkesh, Shahram, Tamer Nadeem y Michele C. Weigle. "Context-aware content adaptation in access point". En the 2012 ACM Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2370216.2370384.
Texto completoKalman, Gyorgy y Josef Noll. "User controlled content access". En 2008 3rd International Symposium on Wireless Pervasive Computing (ISWPC). IEEE, 2008. http://dx.doi.org/10.1109/iswpc.2008.4556193.
Texto completoOluwatimi, Oyindamola, Daniele Midi y Elisa Bertino. "A Context-Aware System to Secure Enterprise Content". En SACMAT 2016: The 21st ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2914642.2914648.
Texto completoKim, Younghyun, Haneul Ko y Sangheon Pack. "Reducing contents access latency in mobile content oriented networks". En 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983138.
Texto completoZeng, Wenrong, Yuhao Yang y Bo Luo. "Content-Based Access Control: Use data content to assist access control for large-scale content-centric databases". En 2014 IEEE International Conference on Big Data (Big Data). IEEE, 2014. http://dx.doi.org/10.1109/bigdata.2014.7004294.
Texto completoSteiner, Moritz, Damiano Carra y Ernst W. Biersack. "Faster Content Access in KAD". En 2008 Eighth International Conference on Peer-to-Peer Computing (P2P). IEEE, 2008. http://dx.doi.org/10.1109/p2p.2008.28.
Texto completoHasan, Kamrul, Chanhong Park, Minsub Lee y Seong-Ho Jeong. "A cluster-based content access mechanism for Content-Centric Networking". En 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983206.
Texto completoWeiss, Duda y Gifford. "Content-based access to algebraic video". En Proceedings of IEEE International Conference on Multimedia Computing and Systems MMCS-94. IEEE Comput. Soc. Press, 1994. http://dx.doi.org/10.1109/mmcs.1994.292446.
Texto completoTeixeira, Dario y Yassine Faihe. "In-home access to multimedia content". En the tenth ACM international conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/641007.641016.
Texto completoGunsel, B., S. Sariel y O. Icoglu. "Content-based access to art paintings". En rnational Conference on Image Processing. IEEE, 2005. http://dx.doi.org/10.1109/icip.2005.1530116.
Texto completoInformes sobre el tema "CONTENT ACCESS"
Pratt, C., D. Thakore y B. Stark. HTTP Random Access and Live Content. RFC Editor, noviembre de 2019. http://dx.doi.org/10.17487/rfc8673.
Texto completoLevinson, E. Message/External-Body Content-ID Access Type. RFC Editor, diciembre de 1995. http://dx.doi.org/10.17487/rfc1873.
Texto completoZeilenga, K. y J. H. Choi. The Lightweight Directory Access Protocol (LDAP) Content Synchronization Operation. RFC Editor, junio de 2006. http://dx.doi.org/10.17487/rfc4533.
Texto completoLi, Bing, Zhijie Wang, Dijiang Huang y Yan Zhu. Toward Privacy-preserving Content Access Control for Information Centric Networking. Fort Belvoir, VA: Defense Technical Information Center, marzo de 2014. http://dx.doi.org/10.21236/ada606547.
Texto completoKlosek, Katherine. Copyright and Contracts: Issues and Strategies. Association of Research Libraries, julio de 2022. http://dx.doi.org/10.29242/report.copyrightandcontracts2022.
Texto completoMintii, I. S. Using Learning Content Management System Moodle in Kryvyi Rih State Pedagogical University educational process. [б. в.], julio de 2020. http://dx.doi.org/10.31812/123456789/3866.
Texto completoGroeneveld, Caspar, Elia Kibga y Tom Kaye. Deploying an e-Learning Environment in Zanzibar: Feasibility Assessment. EdTech Hub, julio de 2020. http://dx.doi.org/10.53832/edtechhub.0028.
Texto completoChoquette, Gary. PR-000-23COMP-R04 Aboveground Tank Corrosion Comprehensive Compendium. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), mayo de 2023. http://dx.doi.org/10.55274/r0000019.
Texto completoMelnyk, Yuriy. Academic Journal Website Model. KRPOCH, 2018. http://dx.doi.org/10.26697/preprint.melnyk.1.2018.
Texto completoChoquette, Gary. PR-000-23COMP-R05 Pipe Wrinkles Comprehensive Compendia. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), mayo de 2023. http://dx.doi.org/10.55274/r0000020.
Texto completo