2007 Siberian Conference on Control and Communications 2007
DOI: 10.1109/sibcon.2007.371307
|View full text |Cite
|
Sign up to set email alerts
|

Access to the Spatial Data in the Web-Oriented GIS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The security techniques for GIS vector map data have been proposed in recent years [5][6][7][8][9]. Authors have mostly explained various methods to define an access control system for spatial data on the Web, or mentioned the security requirements for geospatial database management systems and privacy policies.…”
Section: Vector Map Data Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…The security techniques for GIS vector map data have been proposed in recent years [5][6][7][8][9]. Authors have mostly explained various methods to define an access control system for spatial data on the Web, or mentioned the security requirements for geospatial database management systems and privacy policies.…”
Section: Vector Map Data Securitymentioning
confidence: 99%
“…Firstly, the key value K us generated from the user's key by the SHA-512 hashing algorithm. The key value K is then used to compute a set of random Gaussian numbers as described by Equations (6) and (7) in Section 3.3. The encrypted objects are then extracted from the encrypted vector map and vertices are re-randomized by the random Gaussian numbers before decryption using the key value K. After the vertex re-randomization process, if the encrypted object cannot be simplified, it is decrypted by the key value K to generate the backbone object.…”
Section: Decryption Processmentioning
confidence: 99%
See 1 more Smart Citation
“…The general approach of selective encryption is to separate the content into two parts. The first part is the public part, which is un-encrypted and accessible by all users [7][8][9][10][11]. The second part is the protected part; it is encrypted.…”
Section: Related Workmentioning
confidence: 99%
“…In encrypting domain, it has many conventional works relate to management, access, and storage, transmission data [8][9][10][11][12][13]. Selective encryption is not a new idea, has been proposed in several applications, especially, in multimedia systems.…”
Section: Related Workmentioning
confidence: 99%