{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T16:40:44Z","timestamp":1740242444408,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540242086"},{"type":"electronic","value":"9783540305675"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30567-5_8","type":"book-chapter","created":{"date-parts":[[2010,7,4]],"date-time":"2010-07-04T17:46:52Z","timestamp":1278265612000},"page":"199-221","source":"Crossref","is-referenced-by-count":4,"title":["Enforcing Semantics-Aware Security in Multimedia Surveillance"],"prefix":"10.1007","author":[{"given":"Naren","family":"Kodali","sequence":"first","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Ayars, J.: Synchronized Multimedia Integration Language. W3C Recommendation (2001), http:\/\/www.w3.org\/TR\/2001\/REC-smil20-20010807"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Braun, M., Castano, S., Ferrari, E., Mesiti, M.: Author-x: A java-based system for XML data protection. In: IFIP Workshop on Database Security, pp. 15\u201326 (2000)","DOI":"10.1007\/0-306-47008-X_2"},{"key":"8_CR3","unstructured":"Bertino, E., Hammad, M., Aref, W., Elmagarmid, A.: An access control model for video database systems. In: Conferece on Information and Knowledge Management (2002)"},{"key":"8_CR4","volume-title":"Proc. of Seventh Int\u2019l World Wide Web Conf. (WWW7)","author":"D. Bulterman","year":"1998","unstructured":"Bulterman, D.: Grins: A graphical interface for creating and playing smil documents. In: Proc. of Seventh Int\u2019l World Wide Web Conf. (WWW7). Elsevier Science, New York (1998)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Damiani, E., de Vimercati, S.D.C.: Securing xml based multimedia content. In: 18th IFIP International Information Security Conference (2003)","DOI":"10.1007\/978-0-387-35691-4_6"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-46439-5_8","volume-title":"Advances in Database Technology - EDBT 2000","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., de Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol.\u00a01777, pp. 121\u2013122. Springer, Heidelberg (2000)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Damiani, E., de Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine grained access control system for xml documents. In: ACM Transactions on Information and System Security, vol.\u00a05 (2002)","DOI":"10.1145\/505586.505590"},{"key":"8_CR8","unstructured":"Ekudden, E., Horn, U., Melander, M., Olin, J.: On-demand mobile mediaa rich service experience for mobile users"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Gu, X., Nahrstedt, K., Yuan, W., Wichadakul, D., Xu, D.: An XML-based quality of service enabling language for the web (2001)","DOI":"10.1006\/jvlc.2001.0227"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst.\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Trans. Database Syst."},{"key":"8_CR11","unstructured":"Kodali, N., Farkas, C., Wijesekera, D.: Enforcing integrity in multimedia surveillance. In: IFIP 11.5 Working Conference on Integrity and Internal Control in Information Systems (2003)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Kodali, N., Wijesekera, D.: Regulating access to SMIL formatted pay-per-view movies. In: 2002 ACM Workshop on XML Security (2002)","DOI":"10.1145\/764792.764801"},{"key":"8_CR13","unstructured":"Kodali, N., Wijesekera, D., Michael, J.B.: SPUTERS: a secure traffic surveillance and emergency response architecture. In: Submission to the Journal of Intelligent Transportaion Systems (2003)"},{"key":"8_CR14","unstructured":"Lowe, G.: Defining information flow (1999)"},{"key":"8_CR15","volume-title":"Full abstraction and semantic equivalence","author":"K. Mulmuley","year":"1987","unstructured":"Mulmuley, K.: Full abstraction and semantic equivalence. MIT Press, Cambridge (1987)"},{"key":"8_CR16","unstructured":"Mobile Internet Toolkit: Nokia, http:\/\/www.nokia.com"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Osborn, S.: Mandatory access control and role-based access control revisited. pp. 31\u201340","DOI":"10.1145\/266741.266751"},{"key":"8_CR18","unstructured":"Pihkala, K., Cesar, P., Vuorimaa, P.: Cross platform smil player. In: International Conference on Communications, Internet and Information Technology (2002)"},{"key":"8_CR19","unstructured":"L. Rutledge, L. Hardman, and J. Ossenbruggen. The use of smil: Multimedia research currently applied on a global scale, 1999."},{"issue":"11-16","key":"8_CR20","first-page":"1421","volume":"31","author":"L. Rutledge","year":"1999","unstructured":"Rutledge, L., van Ossenbruggen., J., Hardman, L., Bulterman, D.C.A.: Anticipating SMIL 2.0: the developing cooperative infrastructure for multimedia on the Web. Computer Networks (Amsterdam, Netherlands: 1999)\u00a031(11-16), 1421\u20131430 (1999)","journal-title":"Computer Networks (Amsterdam, Netherlands: 1999)"},{"issue":"11","key":"8_CR21","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R.S. Sandhu","year":"1993","unstructured":"Sandhu, R.S.: Lattice-based access control models. IEEE Computer\u00a026(11), 9\u201319 (1993)","journal-title":"IEEE Computer"},{"key":"8_CR22","unstructured":"Schmidt, B.K.: An architecture for distributed, interactive, multi-stream, multi-participant audio and video. Technical Report No CSL-TR-99-781, Stanford Computer Science Department (1999)"},{"key":"8_CR23","unstructured":"Stoica, A., Farkas, C.: Secure XML views. In: Proc. IFIP 11.3 Working Conference on Database Security (2002)"},{"key":"8_CR24","unstructured":"Spymake. Integrated surveillance tools, http:\/\/www.spymakeronline.com\/"},{"key":"8_CR25","unstructured":"Mobile VCMS. Field data collection system, http:\/\/www.acrcorp.com"},{"key":"8_CR26","unstructured":"VSAM. Video surveilance and monitoring webpage, at http:\/\/www-2.cs.cmu.edu\/vsam\/"},{"issue":"2","key":"8_CR27","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BF00429748","volume":"3","author":"D. Wijesekera","year":"1996","unstructured":"Wijesekera, D., Srivastava, J.: Quality of service QoS metrics for continuous media. Multimedia Tools and Applications\u00a03(2), 127\u2013166 (1996)","journal-title":"Multimedia Tools and Applications"}],"container-title":["Lecture Notes in Computer Science","Journal on Data Semantics II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30567-5_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T16:14:27Z","timestamp":1740240867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30567-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540242086","9783540305675"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30567-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}