{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:51:41Z","timestamp":1725457901056},"publisher-location":"Boston","reference-count":18,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402079001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-7901-x_5","type":"book-chapter","created":{"date-parts":[[2005,12,21]],"date-time":"2005-12-21T16:51:38Z","timestamp":1135183898000},"page":"67-81","source":"Crossref","is-referenced-by-count":0,"title":["Enforcing Integrity in Multimedia Surveillance"],"prefix":"10.1007","author":[{"given":"Naren B.","family":"Kodali","sequence":"first","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"B. K. Schmidt \u201cAn Architecture for Distributed, Interactive, Multi-Stream, Multi-Participant Audio and Video\u201d. Technical Report No CSL-TR-99-781, Stanford Computer Science Department."},{"issue":"3","key":"5_CR2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/BF00429748","volume":"2","author":"D. Wijesekera","year":"1996","unstructured":"D. Wijesekera and J. Srivastava, \u201cQuality of Service Metrics for Multimedia\u201d in Multimedia Tools and Applications, Vol 2,No3 1996, pp. 127\u2013166.","journal-title":"Multimedia Tools and Applications"},{"key":"5_CR3","unstructured":"J. Ayers et al. \u201cSynchronized Multimedia Integration Language (SMIL 2.0)\u201d. World Wide Web Consortium (W3C). http:\/\/www.w3.org\/TR\/smil20\/ (August 2001)."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"E. Bertino, M.A. Hammad, W.G. Aref and A.K. Elmagarmid \u201cAn access control model for video database systems\u201d in Conference on Info and Knowledge Management, 2000","DOI":"10.1145\/354756.354838"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"E. Bertino, E. Ferrari S. Castano \u201cSecuring XML Documents with Author-X\u201d in IEEE Internet Computing, vol 5,no3 May\/June 2001","DOI":"10.1109\/4236.935172"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, \u201cSecuring XML Documents\u201d, in Proc. of EDBT2000), Konstanz, Germany, March 27\u201331, 2000.","DOI":"10.1007\/3-540-46439-5_8"},{"key":"5_CR7","unstructured":"E. Damiani, S. De Capitani di Vimercati, E. Fernandez-Medina, P. Samarati \u201cAn Access Control System for SVG Documents\u201d in Proc. IFIPWG11.3, DBSEC\u2019 02."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"E. Damiani, S. De Capitani di Vimercati \u201cSecuring XML-Based Multimedia Content\u201d Security and privacy in the Age of Uncertainty, Pages 61\u201372.","DOI":"10.1007\/978-0-387-35691-4_6"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"N. Kodali, D. Wijesekera \u201cRegulating Access to SMIL formatted Pay-per-view Movies\u201d in Workshop on XML Security, 2002","DOI":"10.1145\/764792.764801"},{"key":"5_CR10","unstructured":"The Triclops Camera at http:\/\/www.ptgrey.com\/products\/triclopsSDK\/triclops.pdf"},{"key":"5_CR11","unstructured":"Alpha works Suite:XML http:\/\/www.alphaworks.ibm.com\/xml"},{"key":"5_CR12","unstructured":"Spymake Integrated Surveillance Tools at http:\/\/www.spymakeronline.com\/catalogue\/surveillance.html"},{"key":"5_CR13","unstructured":"Mobile VCMS\u2122 \u2014 Field Data Collection System at http:\/\/www.acrcorp.com:8080\/acr_vcms\/mobile"},{"key":"5_CR14","unstructured":"E. Ekudden, U. Horn, M. Melander and J. Olin \u201cOn-demand mobile media\u2014A rich service experience for mobile users\u201d Erricson.com White papers."},{"key":"5_CR15","unstructured":"D. Elliot Bell and Leonard J. LaPadula Secure computer systems: Mathematical foundations. Technical Report 2547 (Volume I), MITRE, March 1973."},{"key":"5_CR16","unstructured":"Sandhu, R. S., Coyne, E. J., Feinstein, H. L. and Youman, C. E. \u201cRole-based access control models\u201d In IEEE Computer, 1998"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"S. Jajodia, P. Samarati, V. S. Subrahmanian, \u201cA logical language for expressing authorizations,\u201d Proc. IEEE Symp. on Security and Privacy, Oakland, 1997, pages 3142","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"5_CR18","unstructured":"K. Mulmuley \u201cFull Abstraction and Semantic Equivalence,\u201d ACM Doctoral Dissertation Award 1986, The MIT Press, Cambridge. MA, London, England, 1987"}],"container-title":["IFIP International Federation for Information Processing","Integrity and Internal Control in Information Systems VI"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-7901-X_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:16:45Z","timestamp":1619554605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-7901-X_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402079001"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/1-4020-7901-x_5","relation":{},"subject":[]}}