The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In typical applications, chromatic indices are calculated as linear combinations of the normalized r-, g- and b-channels and used as features for a later classification based on chromatic appearance. But the variety of indices used in the literature is very limited. Furthermore is the choice of which index to use justified either empirically, based on false mathematical assumptions or not justified...
The Quantity Based Aggregation (QBA) policy is very simple, yet understudied by the scientific community. The QBA policy can be stated as follows: given a set of sensitive objects, no more than a limited number of these objects should be disclosed. In [1], [2], the authors defined a QBA control model for relational databases supporting projection-selection queries on single relations. In [3]–[6],...
The quantity based aggregation (QBA) problem is closely related to the classical inference problem found in databases, and usually discussed with it. In [1], [2] we proposed a model to enforce QBA in a cadastral database. The main purpose of this paper is to 1) describe implementation details of the algorithm, 2) present the algorithm's benchmark results, and 3) provide a discussion about the trade-off...
Service Oriented Architectures (SOA) offer new opportunities for the interconnection of systems. However, for a company, opening its Information System to the "world" is not insignificant in terms of security. Whether to use available services or provide its own services, new technologies have introduced new vulnerabilities and therefore new risks. Our work aims to propose an approach for...
Sharing and publishing images and photos have become the trend of nowadays (social networks, messengers, etc.). Providing appropriate techniques to preserve privacy and protect content of sensitive and private images is an essential need. In this paper, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express...
The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.