Overview of fine granularity scalability in MPEG-4 video standard, IEEE Transactions on Circuits and Systems for Video Technology, vol.11, issue.3, pp.301-317, 2001. ,
The JPEG2000 still image coding system: an overview, IEEE Transactions on Consumer Electronics, vol.46, issue.4, pp.1103-1127, 2000. ,
DOI : 10.1109/30.920468
An efficient key scheme for layered access control of MPEG-4 FGS video, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), pp.443-446, 2004. ,
DOI : 10.1109/ICME.2004.1394224
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images, 2008 15th IEEE International Conference on Image Processing, pp.3116-3119, 2008. ,
DOI : 10.1109/ICIP.2008.4712455
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control, 2007 IEEE International Conference on Image Processing, pp.137-140, 2007. ,
DOI : 10.1109/ICIP.2007.4379111
Generalized hierarchical encryption of JPEG 2000 codestreams for access control, IEEE International Conference on Image Processing 2005, pp.1094-1097, 2005. ,
DOI : 10.1109/ICIP.2005.1530250
Constructing Key Assignment Schemes from Chain Partitions, 2010. ,
DOI : 10.1007/978-3-642-13739-6_9
URL : https://hal.archives-ouvertes.fr/hal-01056664
On Key Assignment for Hierarchical Access Control, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.98-111, 2006. ,
DOI : 10.1109/CSFW.2006.20
Introduction to Lattices and Order, 1990. ,
DOI : 10.1017/CBO9780511809088
Introduction to Modern Cryptography, 2007. ,
Secure computer systems: Unified exposition and Multics interpretation, 1976. ,
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Dynamic and Efficient Key Management for Access Hierarchies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-43, 2009. ,
DOI : 10.1145/1455526.1455531
A Decomposition Theorem for Partially Ordered Sets, The Annals of Mathematics, vol.51, issue.1, pp.161-166, 1950. ,
DOI : 10.2307/1969503
Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, vol.1, issue.3, pp.239-248, 1983. ,
DOI : 10.1145/357369.357372
Key management for non-tree access hierarchies, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.11-18, 2006. ,
DOI : 10.1145/1133058.1133062
Efficient techniques for realizing geo-spatial access control, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.82-92, 2007. ,
DOI : 10.1145/1229285.1229301