Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/92964
標題: Fine-grained Access Control Models for Image Management Systems
細緻化存取控制模型應用於影像管理系統
作者: 陳品融
Ping-Jung Chen
引用: 薛夙珍, 呂瑞麟, & 白琤瑜(2011 年 4 月)。應用於適性化數位學習系統之存取控制機制研究。資訊管理學報,18(2),43-71。 Atluri V., & Chun S. A. (2004). An Authorization Model for Geospatial Data. IEEE Transactions on Dependable and Secure Computing, 1(4), 238-254. Atluri V., & Chun S. A. (2007 年 2 月 1 日). A geotemporal role-based authorisation system. International Journal of Information and Computer Security, 1(1-2),143-168. Bertino E., Castano S., & Ferrar E. (2001). Securing XML Documents with Author-X. IEEE Internet Computing, 5(3), 21–31. Bouna B. A., Chbeir R., Gabillon A., & Capolsini P. (2012). A Fine-grained Image Access Control Model. Eighth International Conference on Signal Image Technology and Internet Based Systems (SITIS) (603–612). Naples: IEEE. Chand R., & Felber P. (2008). Scalable Distribution of XML Content with XNET. IEEE Transactions on Parallel and Distributed Systems, 19(4), 447-461. Chang C. C., Chen Y. H., & Kieu T. D. (2010). A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents. ICIC Express Letters, 4(1), 89-94. Chen Y. H., Lu E. J. L., & Wang C. F. (2013). Privacy image protection using fine-grained mosaic technique. 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA) (頁 1-4). Kaohsiung: IEEE. Damiani E., Vimercati S. D. C. D., Paraboschi S., & Samarati P. (2002). A Fine-grained Access Control System for XML Documents. ACM Transactions on Information and System Security, 5(2), 169-202. Ding Q., Ding Q., & Perrizo W. (2008). PARM—An Efficient Algorithm to Mine Association Rules From Spatial Data. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 38(6), 1513-1524. Gabillon A., & Capolsini P.. (2012). Enforcing Protection Mechanisms for Geographic Data. Web and Wireless Geographical Information Systems, 7236,185-202. Grosbois R., Gerbelot P., & Ebrahimi T. (2001). Authentication and Access Control in The JPEG 2000 Compressed Domain. SPIE Proc. of 46th Annual Meeting Applications of Digital Image Processing XXIV, 95-104. Imaizumi S., Watanabe O., Fujiyoshi M., & Kiya H. (2005). Generalized Hierarchical Encryption of JPEG 2000 Code Streams for Access Control. IEEE Proc. of Conf. On Image Processing, 1094-1097. Joshi J. B.D., Bertino E., & Ghafoor A. (2005 年 4 月). An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Dependable and Secure Computing, 2(2), 157-175. Lu E.J. L., & Chen R. F. (2003 年 10 月). Design and implementation of a fine-grained menu control processor for web-based information systems. Future Generation Computer Systems, 19(7), 1105–1119. Ma F., Gao Y., Yan M., Xu F., & Liu D. (2010). The fine-grained security access control of spatial data. 18th International Conference on Geoinformatics (1-4). Beijing: IEEE. Ni Q., Bertino E., Brodie C., Karat C. M., Karat J., Lobo J., & Trombetta A. (2010 年 7 月 1 日). Privacy-aware Role-based Access Control. ACM Transactions on Information and System Security (TISSEC), 13(3), 35-43. Phadikar A., Kundu M. K., & Maity S. P. (2008). Quality Access Control of A Compressed Gray Scale Image. Proc. of Conf. On Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG 08), (13-19). Pickering M., Coria L. E., & Nasiopoulos P. (2007). A Novel Blind Video Watermarking Scheme for Access Control Using Complex Wavelets. IEEE Proc. of Conf. on Consumer Electronics (1-2). IEEE. QuestionMan inThe. (2008 年 11 月 17 日). Wikimedia Commons. 2014 年 7 月 6 日擷取自 http://commons.wikimedia.org/wiki/File:Horham_Hall_blueprint.png Rajpoot M. S., & Patel P. (2014). A Comparative Study on Various Aspects of Security of Geospatial Data. Fourth International Conference on Communication Systems and Network Technologies (CSNT) (708-712). Bhopal, India: IEEE. Suarez B. P., Molina C., Yanez C. P., & Reyes M. P. D. (2012). Contextualized Access to Electronical Health Records in Cardiology. IEEE Transactions on Information Technology in Biomedicine, 16(3), 401-412. Wan Z., Liu J., & Deng R. H. (2012). HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. IEEE Transactions on Information Forensics and Security, 7(2), 743-754. Zeng Y. H., Wei Z. K., & Yin Q. (2007). Research on Spatial Database: A Secure Access Mechanism. Proceedings of the Sixth International Conference on Machine Learning and Cybernetics. 4, 2174-2178. Hong Kong: IEEE. Zhang Y., & Wang Q. (2008). Security model for distributed GIS spatial. Symposium on Information Science and Engineering. 2, 641-645. IEEE.
摘要: With the rapid resolution of Web technologies, it enables user easily share multimedia object to internet instead of only can transferred text before. The share of multimedia object is not only used in the personal purpose but also many companies take advantage of it in a lot of business activities, such as quality of services, IC collaborative design, geospatial information system, etc. Although sharing the digital content through Internet is convenient, it probably brings some security risks to leak someone's privacy information because the Internet is a public but insecure environment. Access control, a kind of security mechanisms, is one of solutions to authorize different authorizations to different users according to their own permission. In past researches, access control is widely used to protect the historical medical records and to recently develop in cloud computing and wireless sensor network. Nowadays, image access control is widely used in the QoS (Quality of Services) for wireless communication systems. The QoS control models for digital images is insufficient for some specific domains, such as publishing and collaboration. This is because most of them focus on how to control for a whole image, but just one a parts of the image. Another important issue is object hierarchy; that is, the overview model to organize the components in IC design is treated as the first layer and the detailed design of each component is treated as the second layer, and the image shown in second layer might contain its detailed design as the third layer, and so on. This paper proposed two fine-grained access control models for digital image systems. The first scheme enables users to have different views of an image after they login to their system. The authorization unit for the image can be different parts of the image, such as a pixel, a block, several blocks or the whole image. The second scheme extends the first scheme to propose the object hierarchy concept for fine-grained image access control model. The experiments provided positive data that confirmed their feasibility.
隨著科技快速的發展,多媒體類型的檔案大量地被使用在各個領域,並且透過網路來傳遞及分享。但由於在網路如此公開的環境下傳輸,機密洩漏的風險也隨之產生,存取控制為解決機密洩漏的方法之一。影像存取控制也應用於許多領域,舉凡影像品質管理、出版業、協同設計等。在這些特定應用下,授體物件(Object)可能不是整張圖 而是影像中的某一區塊,以協同設計為例,根據不同設計團隊,可視的設計圖內容會有所不同,所以必須對不同設計團隊給予不同機密內容的存取權限,這種機制的第一個重點是將細緻化存取控制機制應用於影像上,所謂的細緻化即是存取控制的物件不再只是ㄧ張完整的影像,而可能是影像中的特定區域,甚至是其中的一個像素。圖像中的區塊做授權讓設計者能看得到之外,尚有一個在影像管理上需被考量的議題 那就是物件階層 (Object Hierarchy)授權的概,念,當授權的區塊點選入後,亦可顯示此區域之細部的設計圖,如此一來,圖像與圖像有階層的概念,此應用常出現於室內設計藍圖及超大型積體電路 (Very Large Scale Integration, VLSI)設計圖,在 VLSI 中的元件可能有些元件需外包,有些設計圖是屬公司的核心競爭能力則必須被控制為特定成員才可視,本論文提出了二個模型,第一個模型針對影像設計了細緻化存取控制機制,第二個模型延伸了第一個方法提出了物件階層的概念,讓授權上更具有彈性及安全性,並利用兩個所提出的模型實作出影像管理平台來驗證此兩方法之可行性。
URI: http://hdl.handle.net/11455/92964
其他識別: U0005-2306201509400300
文章公開時間: 2017-07-16
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.