0000000000934024

AUTHOR

Bechara Al Bouna

showing 5 related works from this author

Detecting Inference Channels in Private Multimedia Data via Social Networks

2009

International audience; Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect a…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer sciencemedia_common.quotation_subject[ INFO.INFO-WB ] Computer Science [cs]/WebInference[SCCO.COMP]Cognitive science/Computer scienceAccess control02 engineering and technologycomputer.software_genre01 natural sciences010104 statistics & probability[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]0101 mathematicsSet (psychology)Function (engineering)media_common[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Structure (mathematical logic)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Social networkMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Information sensitivity[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer scienceKey (cryptography)[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businesscomputer
researchProduct

Privacy preserving via tree augmented naïve Bayesian classifier in multimedia database

2011

International audience; In this paper, we propose a novel technique for privacy preserving in multimedia databases. Our technique is based on a multimedia co-occurrence matrix and a tree augmented naive Bayesian classifier (TAN) to detect possible data associations making confidential multimedia objects at risk.

Novel technique[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer scienceMultimedia database[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genre[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB][ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Naive bayesian classifier[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Privacy preservingTree (data structure)[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Data miningcomputerProceedings of the International Conference on Management of Emergent Digital EcoSystems
researchProduct

THE IMAGE PROTECTOR A Flexible Security Rule Specification Toolkit

2011

International audience; The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify s…

[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Multimedia Security[SCCO.COMP] Cognitive science/Computer science[ SCCO.COMP ] Cognitive science/Computer science[SCCO.COMP]Cognitive science/Computer scienceContent ProtectionPrivacy Preserving Security Rules[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Security RulesPrivacy Preserving[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Enforcing role based access control model with multimedia signatures.

2009

International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer access controlComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceXACMLAccess control02 engineering and technologycomputer.software_genreWorld Wide Web[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access control[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Intelligent environmentcomputer.programming_language[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Ambient intelligenceMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Computer security model[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Web servicebusinesscomputerSoftware
researchProduct

Bridging Sensing and Decision Making in Ambient Intelligence Environments

2009

Context-aware and Ambient Intelligence environments represent one of the emerging issues in the last decade. In such intelligent environments, information is gathered to provide, on one hand, autonomic and easy to manage applications, and, on the other, secured access controlled environments. Several approaches have been defined in the literature to describe context-aware application with techniques to capture and represent information related to a specified domain. However and to the best of our knowledge, none has questioned the reliability of the techniques used to extract meaningful knowledge needed for decision making especially if the information captured is of multimedia types (image…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]Ambient intelligenceComputer science02 engineering and technologycomputer.software_genreBridging (programming)[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]uncertainty resolver modelHuman–computer interaction020204 information systemsResolver0202 electrical engineering electronic engineering information engineeringcontext-aware applicationsemantic-based020201 artificial intelligence & image processingData mining[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]computer
researchProduct